· 5 years ago · Feb 10, 2020, 10:58 PM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname ww17.boys4ever.info ISP Confluence Networks Inc
4Continent North America Flag
5VG
6Country Virgin Islands, British Country Code VG
7Region Unknown Local time 10 Feb 2020 17:11 AST
8City Unknown Postal Code Unknown
9IP Address 199.191.50.92 Latitude 18.5
10 Longitude -64.5
11=======================================================================================================================================
12####################################################################################################################################
13> ww17.boys4ever.info
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18ww17.boys4ever.info canonical name = 11392.searchmagnified.com.
19Name: 11392.searchmagnified.com
20Address: 199.191.50.92
21>
22###################################################################################################################################
23Domain Name: BOYS4EVER.INFO
24Registry Domain ID: D503300001182488324-LRMS
25Registrar WHOIS Server: whois.godaddy.com
26Registrar URL: http://www.godaddy.com
27Updated Date: 2020-02-01T20:31:17Z
28Creation Date: 2019-12-03T14:52:37Z
29Registry Expiry Date: 2020-12-03T14:52:37Z
30Registrar Registration Expiration Date:
31Registrar: GoDaddy.com, LLC
32Registrar IANA ID: 146
33Registrar Abuse Contact Email: abuse@godaddy.com
34Registrar Abuse Contact Phone: +1.4806242505
35Reseller:
36Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
37Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
38Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
39Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
40Registrant Organization:
41Registrant State/Province: barbados
42Registrant Country: BB
43Name Server: NS15.ABOVE.COM
44Name Server: NS16.ABOVE.COM
45DNSSEC: unsigned
46###################################################################################################################################
47[+] Target : ww17.boys4ever.info
48
49[+] IP Address : 199.191.50.92
50
51[+] Headers :
52
53[+] Date : Mon, 10 Feb 2020 21:16:41 GMT
54[+] Server : Apache
55[+] Set-Cookie : vsid=918vr3289150018646435; expires=Sat, 08-Feb-2025 21:16:41 GMT; Max-Age=157680000; path=/; domain=ww17.boys4ever.info; HttpOnly
56[+] ntCoent-Length : 7936
57[+] Keep-Alive : timeout=5, max=123
58[+] Connection : Keep-Alive
59[+] Content-Type : text/html; charset=UTF-8
60[+] Cache-Control : private
61[+] Content-Encoding : gzip
62[+] Content-Length : 3552
63
64[+] SSL Certificate Information :
65
66[-] SSL is not Present on Target URL...Skipping...
67
68[+] Whois Lookup :
69
70[+] NIR : None
71[+] ASN Registry : arin
72[+] ASN : 40034
73[+] ASN CIDR : 199.191.50.0/24
74[+] ASN Country Code : VG
75[+] ASN Date : 2015-07-09
76[+] ASN Description : CONFLUENCE-NETWORK-INC, VG
77[+] cidr : 199.191.50.0/23
78[+] name : CN
79[+] handle : NET-199-191-50-0-1
80[+] range : 199.191.50.0 - 199.191.51.255
81[+] description : Confluence Networks Inc
82[+] country : VG
83[+] state : Tortola
84[+] city : Road Town
85[+] address : 3rd Floor, J & C Building, P.O. Box 362
86[+] postal_code : VG1110
87[+] emails : ['abuse@confluence-networks.com', 'noc@confluence-networks.com']
88[+] created : 2015-07-09
89[+] updated : 2015-07-09
90
91[+] Crawling Target...
92
93[+] Looking for robots.txt........[ Found ]
94[+] Extracting robots Links.......[ 1 ]
95[+] Looking for sitemap.xml.......[ Found ]
96[+] Extracting sitemap Links......[ 0 ]
97[+] Extracting CSS Links..........[ 0 ]
98[+] Extracting Javascript Links...[ 0 ]
99[+] Extracting Internal Links.....[ 1 ]
100[+] Extracting External Links.....[ 0 ]
101[+] Extracting Images.............[ 0 ]
102
103[+] Total Links Extracted : 2
104
105[+] Dumping Links in /opt/FinalRecon/dumps/ww17.boys4ever.info.dump
106[+] Completed!
107###################################################################################################################################
108[i] Scanning Site: http://ww17.boys4ever.info
109
110
111
112B A S I C I N F O
113====================
114
115
116[+] Site Title:
117[+] IP address: 199.191.50.92
118[+] Web Server: Apache
119[+] CMS: Could Not Detect
120[+] Cloudflare: Not Detected
121[+] Robots File: Found
122
123-------------[ contents ]----------------
124#robots.txt for all our sites
125User-agent: *
126Disallow: /contact_us.php
127
128-----------[end of contents]-------------
129
130
131
132W H O I S L O O K U P
133========================
134
135 error check your api query
136
137
138
139G E O I P L O O K U P
140=========================
141
142[i] IP Address: 199.191.50.92
143[i] Country: British Virgin Islands
144[i] State:
145[i] City:
146[i] Latitude: 18.5
147[i] Longitude: -64.5
148
149
150
151
152H T T P H E A D E R S
153=======================
154
155
156[i] HTTP/1.1 200 OK
157[i] Date: Mon, 10 Feb 2020 21:17:14 GMT
158[i] Server: Apache
159[i] Set-Cookie: vsid=918vr3289150344414146; expires=Sat, 08-Feb-2025 21:17:14 GMT; Max-Age=157680000; path=/; domain=ww17.boys4ever.info; HttpOnly
160[i] X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4+L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_MDRoDKtLS2KRa4VpiQHFtqvnJIW0JzDwjAAG8YHFIVTcfxj2VwLvZ6qhNPHUbazR55l9085h3PLUWwvfY02cJg==
161[i] Connection: close
162[i] Content-Type: text/html; charset=UTF-8
163
164
165
166
167D N S L O O K U P
168===================
169
170ww17.boys4ever.info. 3599 IN CNAME 11392.searchmagnified.com.
171
172
173
174
175S U B N E T C A L C U L A T I O N
176====================================
177
178Address = 199.191.50.92
179Network = 199.191.50.92 / 32
180Netmask = 255.255.255.255
181Broadcast = not needed on Point-to-Point links
182Wildcard Mask = 0.0.0.0
183Hosts Bits = 0
184Max. Hosts = 1 (2^0 - 0)
185Host Range = { 199.191.50.92 - 199.191.50.92 }
186
187
188
189N M A P P O R T S C A N
190============================
191
192Starting Nmap 7.70 ( https://nmap.org ) at 2020-02-10 21:17 UTC
193Nmap scan report for ww17.boys4ever.info (199.191.50.92)
194Host is up (0.044s latency).
195
196PORT STATE SERVICE
19721/tcp filtered ftp
19822/tcp filtered ssh
19923/tcp filtered telnet
20080/tcp open http
201110/tcp filtered pop3
202143/tcp filtered imap
203443/tcp closed https
2043389/tcp filtered ms-wbt-server
205
206Nmap done: 1 IP address (1 host up) scanned in 1.77 seconds
207
208###################################################################################################################################
209[+] Starting At 2020-02-10 16:18:05.862974
210[+] Collecting Information On: http://ww17.boys4ever.info/
211[#] Status: 200
212--------------------------------------------------
213[#] Web Server Detected: Apache
214[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
215- Date: Mon, 10 Feb 2020 21:17:55 GMT
216- Server: Apache
217- Set-Cookie: vsid=926vr3289150758228171; expires=Sat, 08-Feb-2025 21:17:55 GMT; Max-Age=157680000; path=/; domain=ww17.boys4ever.info; HttpOnly
218- X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4+L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_RbHAeEV5RRDOSmjTgUSbR0XNBvSDQEoTStE1+q1klaP8yoZqoXViLbU4p7gDmHyFyJh0bsOOwzYIwU68ZsrDpQ==
219- ntCoent-Length: 1888
220- Keep-Alive: timeout=5, max=109
221- Connection: Keep-Alive
222- Content-Type: text/html; charset=UTF-8
223- Cache-Control: private
224- Content-Encoding: gzip
225- Content-Length: 1078
226--------------------------------------------------
227[#] Finding Location..!
228[#] status: success
229[#] country: United States
230[#] countryCode: US
231[#] region: DC
232[#] regionName: District of Columbia
233[#] city: Washington
234[#] zip: 20068
235[#] lat: 38.9072
236[#] lon: -77.0369
237[#] timezone: America/New_York
238[#] isp: GigeNET
239[#] org: GigeNET
240[#] as: AS32181 GigeNET
241[#] query: 70.32.1.32
242--------------------------------------------------
243[x] Didn't Detect WAF Presence on: http://ww17.boys4ever.info/
244--------------------------------------------------
245[#] Starting Reverse DNS
246[!] Found 47 any Domain
247- bangood.com
248- boys4ever.info
249- brazilproxy.info
250- checkout.epayco.com.co
251- clien.com
252- cliqq.com
253- cmbank.co
254- edwinwengreyes.tunvpn.co
255- epayco.com.co
256- internet.epayco.com.co
257- internetmovistar.com.co
258- labarraderosario.com
259- lastimes.com
260- m.epayco.com.co
261- macdonald.com.co
262- miclaro.com
263- movista.com.co
264- movistar.epayco.com.co
265- movistar.recargas.epayco.com.co
266- movistar.recaudo.epayco.com.co
267- ooredoomyanmar.com
268- orang.com
269- pelisplus.com.ar
270- pinayxvideo.com
271- r.miclaro.com
272- recargas.epayco.com.co
273- teleksel.com
274- tigo.net
275- tunisietelecom.com
276- whatsappgb.com
277- www.conectarigualdad.com
278- www.efecty.co
279- www.epayco.com.co
280- www.freefire.net
281- www.internetmovistar.com
282- www.internetmovistar.com.co
283- www.miclaro.com
284- www.movista.com.co
285- www.movistar.recargas.epayco.com.co
286- www.o2online.uk
287- www.pakistam.com
288- www.tenglonghr.com
289- www.tufacturamovistar.com
290- www.tunisietelecom.com
291- www.wap.com.co
292- www.webs.es
293- wwwmovistar.com.co
294--------------------------------------------------
295[!] Scanning Open Port
296[#] 53/tcp open domain
297[#] 80/tcp open http
298[#] 443/tcp open https
299--------------------------------------------------
300[+] Getting SSL Info
301{'OCSP': ('http://ocsp.int-x3.letsencrypt.org',),
302 'caIssuers': ('http://cert.int-x3.letsencrypt.org/',),
303 'issuer': ((('countryName', 'US'),),
304 (('organizationName', "Let's Encrypt"),),
305 (('commonName', "Let's Encrypt Authority X3"),)),
306 'notAfter': 'Mar 3 01:13:52 2020 GMT',
307 'notBefore': 'Dec 4 01:13:52 2019 GMT',
308 'serialNumber': '04479750D06EF9C2F0874765D5CDA6950E51',
309 'subject': ((('commonName', 'aewi.info'),),),
310 'subjectAltName': (('DNS', '*.123mediafree.info'),
311 ('DNS', '*.1caihua.info'),
312 ('DNS', '*.3board.info'),
313 ('DNS', '*.3s3s.info'),
314 ('DNS', '*.97hgc.info'),
315 ('DNS', '*.abcgolf.info'),
316 ('DNS', '*.adult-ch.info'),
317 ('DNS', '*.aewi.info'),
318 ('DNS', '*.aijapan.info'),
319 ('DNS', '*.ajdkijejjf.info'),
320 ('DNS', '*.allbrightonjewelry.info'),
321 ('DNS', '*.allesmegageil.info'),
322 ('DNS', '*.allwebsearch.info'),
323 ('DNS', '*.amcikpornosu.info'),
324 ('DNS', '*.angel-torrents.info'),
325 ('DNS', '*.annihilationps3dlc.info'),
326 ('DNS', '*.apiwenuwenapi.info'),
327 ('DNS', '*.auto-a.info'),
328 ('DNS', '*.bantningsmetoder.info'),
329 ('DNS', '*.bazancoffee.info'),
330 ('DNS', '*.binyaz.info'),
331 ('DNS', '*.bj166.info'),
332 ('DNS', '*.bobocon.info'),
333 ('DNS', '*.boys4ever.info'),
334 ('DNS', '*.buddhistpilgrim.info'),
335 ('DNS', '*.churifita.info'),
336 ('DNS', '*.cine-veynes.info'),
337 ('DNS', '*.gamblife.info'),
338 ('DNS', '*.kopel-indonesia.info'),
339 ('DNS', '*.ksplreport.info'),
340 ('DNS', '*.kukuvibes.info'),
341 ('DNS', '*.kuwqic.info'),
342 ('DNS', '*.logisticsblog.info'),
343 ('DNS', '*.mainansex.info'),
344 ('DNS', '*.mytoptierbusinessreview.info'),
345 ('DNS', '*.newclouds.info'),
346 ('DNS', '*.nhomcang.info'),
347 ('DNS', '*.onlinefilmletoltes.info'),
348 ('DNS', '*.owndoctor.info'),
349 ('DNS', '*.pagestatus.info'),
350 ('DNS', '*.shoken-navi.info'),
351 ('DNS', '*.tahanlama.info'),
352 ('DNS', '*.teammuppet.info'),
353 ('DNS', '*.transgenderscience.info'),
354 ('DNS', '*.vsedbe.info'),
355 ('DNS', '*.waremates.info'),
356 ('DNS', '*.watch-movies-free.info'),
357 ('DNS', '*.xixane.info'),
358 ('DNS', '*.yykkse3.info'),
359 ('DNS', '*.zocker-wg.info'),
360 ('DNS', '123mediafree.info'),
361 ('DNS', '1caihua.info'),
362 ('DNS', '3board.info'),
363 ('DNS', '3s3s.info'),
364 ('DNS', '97hgc.info'),
365 ('DNS', 'abcgolf.info'),
366 ('DNS', 'adult-ch.info'),
367 ('DNS', 'aewi.info'),
368 ('DNS', 'aijapan.info'),
369 ('DNS', 'ajdkijejjf.info'),
370 ('DNS', 'allbrightonjewelry.info'),
371 ('DNS', 'allesmegageil.info'),
372 ('DNS', 'allwebsearch.info'),
373 ('DNS', 'amcikpornosu.info'),
374 ('DNS', 'angel-torrents.info'),
375 ('DNS', 'annihilationps3dlc.info'),
376 ('DNS', 'apiwenuwenapi.info'),
377 ('DNS', 'auto-a.info'),
378 ('DNS', 'bantningsmetoder.info'),
379 ('DNS', 'bazancoffee.info'),
380 ('DNS', 'binyaz.info'),
381 ('DNS', 'bj166.info'),
382 ('DNS', 'bobocon.info'),
383 ('DNS', 'boys4ever.info'),
384 ('DNS', 'buddhistpilgrim.info'),
385 ('DNS', 'churifita.info'),
386 ('DNS', 'cine-veynes.info'),
387 ('DNS', 'gamblife.info'),
388 ('DNS', 'kopel-indonesia.info'),
389 ('DNS', 'ksplreport.info'),
390 ('DNS', 'kukuvibes.info'),
391 ('DNS', 'kuwqic.info'),
392 ('DNS', 'logisticsblog.info'),
393 ('DNS', 'mainansex.info'),
394 ('DNS', 'mytoptierbusinessreview.info'),
395 ('DNS', 'newclouds.info'),
396 ('DNS', 'nhomcang.info'),
397 ('DNS', 'onlinefilmletoltes.info'),
398 ('DNS', 'owndoctor.info'),
399 ('DNS', 'pagestatus.info'),
400 ('DNS', 'shoken-navi.info'),
401 ('DNS', 'tahanlama.info'),
402 ('DNS', 'teammuppet.info'),
403 ('DNS', 'transgenderscience.info'),
404 ('DNS', 'vsedbe.info'),
405 ('DNS', 'waremates.info'),
406 ('DNS', 'watch-movies-free.info'),
407 ('DNS', 'xixane.info'),
408 ('DNS', 'yykkse3.info'),
409 ('DNS', 'zocker-wg.info')),
410 'version': 3}
411-----BEGIN CERTIFICATE-----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447-----END CERTIFICATE-----
448
449--------------------------------------------------
450[+] Collecting Information Disclosure!
451[#] Detecting sitemap.xml file
452[!] sitemap.xml File Found: http://ww17.boys4ever.info//sitemap.xml
453[#] Detecting robots.txt file
454[!] robots.txt File Found: http://ww17.boys4ever.info//robots.txt
455[#] Detecting GNU Mailman
456[-] GNU Mailman App Not Detected!?
457--------------------------------------------------
458[+] Crawling Url Parameter On: http://ww17.boys4ever.info/
459--------------------------------------------------
460[#] Searching Html Form !
461[-] No Html Form Found!?
462--------------------------------------------------
463[-] No DOM Paramter Found!?
464--------------------------------------------------
465[!] 1 Internal Dynamic Parameter Discovered
466[+] http://ww17.boys4ever.info/?fp=0o2fs8B8eaCrn6EQ3UT6vl8aCB5lXbzQU3O5bNxQcCGB4c6PwTINkm6%2FyQUwxYf1uYbNRDdUJK3QSC1NwewBciCk%2Fh4WGjkaW7Kh%2FKQjK6h%2ByMqdBmG8mvB1YhrOmrvkeLZT5MwKkBzq72iZKkHodeozyNfWj%2B%2FVtfP4IaXGXkM%3D&prvtof=Z6OgrO12TMwOVpAy96xDfIWjAJDZJKsVULio07KTT%2F4%3D&poru=YMNqCQcgBPy%2FDqmKK1IFufxqrDoSgi64w9WfbkWMRUWIhIa0UzZCm9Znh%2Bln88I0&
467--------------------------------------------------
468[-] No external Dynamic Paramter Found!?
469--------------------------------------------------
470[-] No Internal Link Found!?
471--------------------------------------------------
472[-] No External Link Found!?
473--------------------------------------------------
474[#] Mapping Subdomain..
475[!] Found 1 Subdomain
476- boys4ever.info
477--------------------------------------------------
478[!] Done At 2020-02-10 16:18:39.973883
479###################################################################################################################################
480[INFO] ------TARGET info------
481[*] TARGET: http://ww17.boys4ever.info/
482[*] TARGET IP: 199.191.50.92
483[INFO] NO load balancer detected for ww17.boys4ever.info...
484[*] DNS servers: 11392.searchmagnified.com.
485[*] TARGET server:
486[*] CC: VG
487[*] Country: British Virgin Islands
488[*] RegionCode:
489[*] RegionName: Tortola
490[*] City: Road Town
491[*] ASN: AS40034
492[*] BGP_PREFIX: 199.191.50.0/24
493[*] ISP: CONFLUENCE-NETWORK-INC, VG
494[INFO] DNS enumeration:
495[*] ad.boys4ever.info 170.178.168.203
496[*] admin.boys4ever.info 170.178.168.203
497[*] ads.boys4ever.info 70.32.1.32
498[*] alpha.boys4ever.info 70.32.1.32
499[*] api.boys4ever.info 70.32.1.32
500[*] api-online.boys4ever.info 170.178.168.203
501[*] apolo.boys4ever.info 170.178.168.203
502[*] app.boys4ever.info 70.32.1.32
503[*] beta.boys4ever.info 70.32.1.32
504[*] bi.boys4ever.info 70.32.1.32
505[*] blog.boys4ever.info 70.32.1.32
506[*] cdn.boys4ever.info 70.32.1.32
507[*] events.boys4ever.info 70.32.1.32
508[*] ex.boys4ever.info 170.178.168.203
509[*] files.boys4ever.info 70.32.1.32
510[*] ftp.boys4ever.info 70.32.1.32
511[*] gateway.boys4ever.info 170.178.168.203
512[*] go.boys4ever.info 170.178.168.203
513[*] help.boys4ever.info 70.32.1.32
514[*] ib.boys4ever.info 70.32.1.32
515[*] images.boys4ever.info 170.178.168.203
516[*] internetbanking.boys4ever.info 70.32.1.32
517[*] intranet.boys4ever.info 70.32.1.32
518[*] jobs.boys4ever.info 170.178.168.203
519[*] join.boys4ever.info 70.32.1.32
520[*] live.boys4ever.info 170.178.168.203
521[*] login.boys4ever.info 170.178.168.203
522[*] m.boys4ever.info 170.178.168.203
523[*] mail.boys4ever.info 170.178.168.203
524[*] mail2.boys4ever.info 170.178.168.203
525[*] mobile.boys4ever.info 70.32.1.32
526[*] moodle.boys4ever.info 70.32.1.32
527[*] mx.boys4ever.info 70.32.1.32
528[*] mx2.boys4ever.info 170.178.168.203
529[*] mx3.boys4ever.info 70.32.1.32
530[*] my.boys4ever.info 70.32.1.32
531[*] new.boys4ever.info 70.32.1.32
532[*] news.boys4ever.info 170.178.168.203
533[*] ns1.boys4ever.info 170.178.168.203
534[*] ns2.boys4ever.info 70.32.1.32
535[*] ns3.boys4ever.info 170.178.168.203
536[*] oauth.boys4ever.info 70.32.1.32
537[*] old.boys4ever.info 170.178.168.203
538[*] one.boys4ever.info 170.178.168.203
539[*] open.boys4ever.info 70.32.1.32
540[*] out.boys4ever.info 70.32.1.32
541[*] outlook.boys4ever.info 70.32.1.32
542[*] portfolio.boys4ever.info 70.32.1.32
543[*] raw.boys4ever.info 70.32.1.32
544[*] repo.boys4ever.info 70.32.1.32
545[*] router.boys4ever.info 70.32.1.32
546[*] search.boys4ever.info 70.32.1.32
547[*] siem.boys4ever.info 170.178.168.203
548[*] slack.boys4ever.info 170.178.168.203
549[*] slackbot.boys4ever.info 170.178.168.203
550[*] snmp.boys4ever.info 170.178.168.203
551[*] stream.boys4ever.info 70.32.1.32
552[*] support.boys4ever.info 170.178.168.203
553[*] syslog.boys4ever.info 170.178.168.203
554[*] tags.boys4ever.info 70.32.1.32
555[*] test.boys4ever.info 170.178.168.203
556[*] upload.boys4ever.info 70.32.1.32
557[*] video.boys4ever.info 70.32.1.32
558[*] vpn.boys4ever.info 170.178.168.203
559[*] webconf.boys4ever.info 170.178.168.203
560[*] webmail.boys4ever.info 170.178.168.203
561[*] webportal.boys4ever.info 70.32.1.32
562[*] wiki.boys4ever.info 70.32.1.32
563[*] www2.boys4ever.info 170.178.168.203
564[*] www3.boys4ever.info 70.32.1.32
565[*] zendesk.boys4ever.info 70.32.1.32
566[INFO] Possible abuse mails are:
567[*] abuse@boys4ever.info
568[*] abuse@confluence-networks.com
569[*] abuse@softlayer.com
570[*] abuse@ww17.boys4ever.info
571[INFO] NO PAC (Proxy Auto Configuration) file FOUND
572[ALERT] robots.txt file FOUND in http://ww17.boys4ever.info/robots.txt
573[INFO] Checking for HTTP status codes recursively from http://ww17.boys4ever.info/robots.txt
574[INFO] Status code Folders
575[*] 200 http://ww17.boys4ever.info/contact_us.php
576[INFO] Starting FUZZing in http://ww17.boys4ever.info/FUzZzZzZzZz...
577[INFO] Status code Folders
578[*] 200 http://ww17.boys4ever.info/index
579[*] 200 http://ww17.boys4ever.info/images
580[*] 200 http://ww17.boys4ever.info/download
581[*] 200 http://ww17.boys4ever.info/2006
582[*] 200 http://ww17.boys4ever.info/news
583[*] 200 http://ww17.boys4ever.info/crack
584[*] 200 http://ww17.boys4ever.info/serial
585[*] 200 http://ww17.boys4ever.info/warez
586[*] 200 http://ww17.boys4ever.info/full
587[*] 200 http://ww17.boys4ever.info/12
588[ALERT] Look in the source code. It may contain passwords
589[ALERT] Content in http://ww17.boys4ever.info/ AND http://www.ww17.boys4ever.info/ is different
590[INFO] MD5 for http://ww17.boys4ever.info/ is: a340d1778b98837360995f96fc42ae57
591[INFO] MD5 for http://www.ww17.boys4ever.info/ is: 0fc6147b100510ccf1867fd3a39ebc2a
592[INFO] http://ww17.boys4ever.info/ redirects to http://ww17.boys4ever.info/
593[INFO] http://www.ww17.boys4ever.info/ redirects to http://ww17.ww17.boys4ever.info/
594[INFO] Links found from http://ww17.boys4ever.info/ http://199.191.50.92/:
595[*] http://unifwd.com/?fp=rWHgkjchdO3O6aoBwDpjrrDxVvuzwZPKL+IAMzyj2ZJAthp/DM6aCaPj8xTO6kUuhtDOeC1DzrTcWCC0LEhfUVc74aX+PW969wYxWgA76pBp5ENcujh7MjxdC5jeYbbcS4YBSSQ5BgBin7/RZGGwqrrZpn8dxUUL6HWBVcWsRPg=&prvtof=AqNBW4jj+s8j9gi9oM/SZVL3TUFb3zz+pPJ6c6tXYt4=&poru=7UHQdDj3uLcafluHB8F2pgkpK7xaCPB7O0WmDj5sq1fg6WKBeAQ/YtO/e80dQfuN&
596[*] http://unifwd.com/?fp=rWHgkjchdO3O6aoBwDpjrrDxVvuzwZPKL+IAMzyj2ZJAthp/DM6aCaPj8xTO6kUuhtDOeC1DzrTcWCC0LEhfUVc74aX+PW969wYxWgA76pBp5ENcujh7MjxdC5jeYbbcS4YBSSQ5BgBin7/RZGGwqrrZpn8dxUUL6HWBVcWsRPg=&prvtof=kSqyyJ4M03lUICURpcmG40LeHQyduDRqAA8PAEBcxWQ=&poru=iXx90HnYjx5QqiN/hix2xwVYphpA9CSVyMu6vLhd3I03e9z4saK1Hd20QImOtILG&
597[*] http://ww17.boys4ever.info/?fp=1ttjKev18De3eF8aNdN6oxUe5jMQ/ycvTSM+q6rU2Q28VxvdKYynROi+R6aXOJXSdHcVqACHzIrTm8ikyBy7w0XtsnVEGZ7s78A0Zhg00IAwu37A9YHBtMyEWkfdk8qk2/K8eDXW+q3yphvZiScdnTA+g/mpYGBLZ0bvx+pn3aY=&prvtof=DXzeQ0SC/eX623RMBBQRTZq/gVJUj7reqHB4sMTMsxU=&poru=11XFiV/0yBWjwPovlL7AyDu/yA0C8rA/xmmt5DIysCPGHjlwMsiv7f8ecWLCD2T+&
598[*] http://ww17.boys4ever.info/?fp=1ttjKev18De3eF8aNdN6oxUe5jMQ/ycvTSM+q6rU2Q28VxvdKYynROi+R6aXOJXSdHcVqACHzIrTm8ikyBy7w0XtsnVEGZ7s78A0Zhg00IAwu37A9YHBtMyEWkfdk8qk2/K8eDXW+q3yphvZiScdnTA+g/mpYGBLZ0bvx+pn3aY=&prvtof=P70oLD+YKg/gfqSzMi9Q+jjqqXx7OauT6mi+sxxY928=&poru=X62/vaBD3Vz9W14YX4KjExdO3QDPD0dun9HAYRg1AhLDFZ+UxJeYzY1ntpDyO4h2&
599cut: intervalle de champ incorrecte
600Saisissez « cut --help » pour plus d'informations.
601[INFO] Shodan detected the following opened ports on 199.191.50.92:
602[*] 53
603[*] 80
604[INFO] ------VirusTotal SECTION------
605[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
606[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
607[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
608[INFO] ------Alexa Rank SECTION------
609[INFO] Percent of Visitors Rank in Country:
610[INFO] Percent of Search Traffic:
611[INFO] Percent of Unique Visits:
612[INFO] Total Sites Linking In:
613[*] Total Sites
614[INFO] Useful links related to ww17.boys4ever.info - 199.191.50.92:
615[*] https://www.virustotal.com/pt/ip-address/199.191.50.92/information/
616[*] https://www.hybrid-analysis.com/search?host=199.191.50.92
617[*] https://www.shodan.io/host/199.191.50.92
618[*] https://www.senderbase.org/lookup/?search_string=199.191.50.92
619[*] https://www.alienvault.com/open-threat-exchange/ip/199.191.50.92
620[*] http://pastebin.com/search?q=199.191.50.92
621[*] http://urlquery.net/search.php?q=199.191.50.92
622[*] http://www.alexa.com/siteinfo/ww17.boys4ever.info
623[*] http://www.google.com/safebrowsing/diagnostic?site=ww17.boys4ever.info
624[*] https://censys.io/ipv4/199.191.50.92
625[*] https://www.abuseipdb.com/check/199.191.50.92
626[*] https://urlscan.io/search/#199.191.50.92
627[*] https://github.com/search?q=199.191.50.92&type=Code
628[INFO] Useful links related to AS40034 - 199.191.50.0/24:
629[*] http://www.google.com/safebrowsing/diagnostic?site=AS:40034
630[*] https://www.senderbase.org/lookup/?search_string=199.191.50.0/24
631[*] http://bgp.he.net/AS40034
632[*] https://stat.ripe.net/AS40034
633[INFO] Date: 10/02/20 | Time: 16:20:26
634[INFO] Total time: 2 minute(s) and 14 second(s)
635###################################################################################################################################
636Trying "boys4ever.info"
637;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64542
638;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 4
639
640;; QUESTION SECTION:
641;boys4ever.info. IN ANY
642
643;; ANSWER SECTION:
644boys4ever.info. 3600 IN MX 10 park-mx.above.com.
645boys4ever.info. 60 IN SOA ns1.above.com. hostmaster.trellian.com. 2020021101 10800 3600 604800 3600
646boys4ever.info. 3600 IN A 70.32.1.32
647boys4ever.info. 43200 IN NS ns1.above.com.
648boys4ever.info. 43200 IN NS ns2.above.com.
649
650;; ADDITIONAL SECTION:
651ns1.above.com. 41704 IN A 103.224.182.5
652ns1.above.com. 41704 IN A 103.224.212.5
653ns2.above.com. 39369 IN A 103.224.212.6
654ns2.above.com. 39369 IN A 103.224.182.6
655
656Received 237 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 283 ms
657###################################################################################################################################
658; <<>> DiG 9.11.14-3-Debian <<>> +trace boys4ever.info any
659;; global options: +cmd
660. 83651 IN NS j.root-servers.net.
661. 83651 IN NS i.root-servers.net.
662. 83651 IN NS d.root-servers.net.
663. 83651 IN NS l.root-servers.net.
664. 83651 IN NS g.root-servers.net.
665. 83651 IN NS h.root-servers.net.
666. 83651 IN NS m.root-servers.net.
667. 83651 IN NS a.root-servers.net.
668. 83651 IN NS e.root-servers.net.
669. 83651 IN NS b.root-servers.net.
670. 83651 IN NS k.root-servers.net.
671. 83651 IN NS c.root-servers.net.
672. 83651 IN NS f.root-servers.net.
673. 83651 IN RRSIG NS 8 0 518400 20200223170000 20200210160000 33853 . jtRGKNeEM8yezXKjfBZz4zwQNWD5DPeHrojhjl9RiBQomsgBwMae46mk HkALKsdEOpLtkmNonb6aATi2E3/uEUKvRZ3VNGbySYLgyATO/mfNoLT2 Lxocie0XJYGlPf4nGyaAkjFwmpyTiDu/V+S5r51WwDbnjxa+mgAWlE/l tD9E6rDADDIEjTax/BokACGjjkH73W8x2l90/5VeXahusH/9jk6Dgzf5 hmHxB9XGcVx/YPGyoCjWRve/xzKF65Ep8Rauh87gQwLL6r13M4WVn5xz PriT5SnMvINP1K7PqRTF9aKUETvs7NcrQzU6/1ikKmbveyj43yfOTD29 gX2R2g==
674;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 318 ms
675
676info. 172800 IN NS a0.info.afilias-nst.info.
677info. 172800 IN NS b0.info.afilias-nst.org.
678info. 172800 IN NS c0.info.afilias-nst.info.
679info. 172800 IN NS d0.info.afilias-nst.org.
680info. 172800 IN NS a2.info.afilias-nst.info.
681info. 172800 IN NS b2.info.afilias-nst.org.
682info. 86400 IN DS 8674 7 1 197789A2CBABA6FECD0B5AC88C5BC414CE1FC309
683info. 86400 IN DS 8674 7 2 EC9B6082B96B5F87143696F2B483ACC9B2C433DCE0C94E70F1FF5648 CA18008B
684info. 86400 IN RRSIG DS 8 1 86400 20200223170000 20200210160000 33853 . aAWxiKmbsX5eBZqLMTnHt2zUdcsxVQZjZpbcBhk3pGibykuoMP6WCMOk YWUP8fZX8gGp/aToxG+ndQp8E5G516e0h0DTOxOfbaNyrYB7mvgM6WFt P9gr7ulw+UgUNEP1jR/FMOj3y81tu14hEHx/tS33xukmy1XXng197eE6 JOIrwZK/TUfBUadGjhPg+ovQf/c0rFb1P4rzxCVjmGVth/v4VegzEmmo BkSFYYkWy+COGaUS4iuQ6JcO1D7YuQn3o8YBolKyg6HpBFLn2fQaDtJn xUW0hiC/vuiPcL0DFBIipN4CiO4NSb8meCFcCqgZTSSwIS8O33CcJdqc kljSOA==
685;; Received 845 bytes from 2001:500:200::b#53(b.root-servers.net) in 71 ms
686
687boys4ever.info. 86400 IN NS ns15.above.com.
688boys4ever.info. 86400 IN NS ns16.above.com.
689adnsd9nk7nk82he8h21rj0jjhj11o5gb.info. 3600 IN NSEC3 1 1 1 D399EAAB ADNVG6B2JJN9MIEU7DJB24BL7RG5MDPI NS SOA RRSIG DNSKEY NSEC3PARAM
690adnsd9nk7nk82he8h21rj0jjhj11o5gb.info. 3600 IN RRSIG NSEC3 7 2 3600 20200302212113 20200210202113 36317 info. hYji2mO6HDm2WO8Du4+vI6g4sjk9irdJlrUMSgV7RGb9FvCU7I9mZa0J NFOiUth4PU+3Twx/RFdRMm/85hBjMee+pnixYdTr00FqNVullU50PAPO AkgzrgsICfyQCN1ftFBQ/gMX15Me5tUcUpIaQgJ9SazVrJXi+hWyAc8L 8iM=
691mcef4qjnk0jckegdcojd9nd63kt1mdl5.info. 3600 IN NSEC3 1 1 1 D399EAAB MCEQ8HQ63BGORVPIQ1F707FC2JF747B6 A RRSIG
692mcef4qjnk0jckegdcojd9nd63kt1mdl5.info. 3600 IN RRSIG NSEC3 7 2 3600 20200301152143 20200209142143 36317 info. gLT/vhxs8UbsTQSgZlsw3TrWsRI6ZtxMmt6Xnn3f4lCYZPrezZGHTbgI rGHNxPBfS2Wiyvz2MkYKJ4n0uAro9gXVz9coScVaddTF2UkXmUKNJTl2 t90gQMNNKfG8+6mxTjI2bTW61ebYaw68faNyXFKJDdm5be3ZRePQua58 VzI=
693;; Received 585 bytes from 2001:500:1a::1#53(b0.info.afilias-nst.org) in 93 ms
694
695boys4ever.info. 3600 IN A 70.32.1.32
696boys4ever.info. 86400 IN NS ns1.above.com.
697boys4ever.info. 86400 IN NS ns2.above.com.
698boys4ever.info. 60 IN SOA ns1.above.com. hostmaster.trellian.com. 2020021101 10800 3600 604800 3600
699boys4ever.info. 3600 IN MX 10 park-mx.above.com.
700;; Received 232 bytes from 103.224.212.6#53(ns16.above.com) in 722 ms
701
702###################################################################################################################################
703[*] Performing General Enumeration of Domain: boys4ever.info
704[!] Wildcard resolution is enabled on this domain
705[!] It is resolving to 170.178.168.203
706[!] All queries will resolve to this address!!
707[-] DNSSEC is not configured for boys4ever.info
708[*] SOA ns2.above.com 103.224.212.6
709[*] SOA ns2.above.com 103.224.182.6
710[*] NS ns15.above.com 103.224.182.5
711[*] Bind Version for 103.224.182.5 PowerDNS Authoritative Server 4.0.3
712[*] NS ns15.above.com 103.224.212.5
713[*] Bind Version for 103.224.212.5 PowerDNS Authoritative Server 4.0.3
714[*] NS ns16.above.com 103.224.212.6
715[*] Bind Version for 103.224.212.6 PowerDNS Authoritative Server 4.0.3
716[*] NS ns16.above.com 103.224.182.6
717[*] Bind Version for 103.224.182.6 PowerDNS Authoritative Server 4.0.3
718[*] MX park-mx.above.com 103.224.212.34
719[*] A boys4ever.info 170.178.168.203
720[*] Enumerating SRV Records
721[-] No SRV Records Found for boys4ever.info
722[+] 0 Records Found
723###################################################################################################################################
724[*] Processing domain boys4ever.info
725[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
726[+] Getting nameservers
727103.224.182.5 - ns15.above.com
728103.224.212.5 - ns15.above.com
729103.224.212.6 - ns16.above.com
730103.224.182.6 - ns16.above.com
731[-] Zone transfer failed
732
733[+] MX records found, added to target list
73410 park-mx.above.com.
735
736[+] Wildcard domain found - 70.32.1.32
737[*] Scanning boys4ever.info for A records
738170.178.168.203 - boys4ever.info
739170.178.168.203 - ad.boys4ever.info
740170.178.168.203 - adm.boys4ever.info
741170.178.168.203 - accounting.boys4ever.info
742170.178.168.203 - admin.boys4ever.info
743170.178.168.203 - administrator.boys4ever.info
744170.178.168.203 - affiliates.boys4ever.info
745170.178.168.203 - adserver.boys4ever.info
746170.178.168.203 - agenda.boys4ever.info
747170.178.168.203 - affiliate.boys4ever.info
748170.178.168.203 - analytics.boys4ever.info
749170.178.168.203 - apollo.boys4ever.info
750170.178.168.203 - archive.boys4ever.info
751170.178.168.203 - art.boys4ever.info
752170.178.168.203 - auto.boys4ever.info
753170.178.168.203 - assets.boys4ever.info
754170.178.168.203 - autoconfig.boys4ever.info
755170.178.168.203 - av.boys4ever.info
756170.178.168.203 - backups.boys4ever.info
757170.178.168.203 - backup.boys4ever.info
758170.178.168.203 - b2b.boys4ever.info
759170.178.168.203 - bb.boys4ever.info
760170.178.168.203 - billing.boys4ever.info
761170.178.168.203 - blackboard.boys4ever.info
762170.178.168.203 - biblioteca.boys4ever.info
763170.178.168.203 - blogs.boys4ever.info
764170.178.168.203 - booking.boys4ever.info
765170.178.168.203 - bt.boys4ever.info
766170.178.168.203 - bookings.boys4ever.info
767170.178.168.203 - bugs.boys4ever.info
768170.178.168.203 - business.boys4ever.info
769170.178.168.203 - cache.boys4ever.info
770170.178.168.203 - calendar.boys4ever.info
771170.178.168.203 - cam.boys4ever.info
772170.178.168.203 - catalogo.boys4ever.info
773170.178.168.203 - catalogue.boys4ever.info
774170.178.168.203 - catalog.boys4ever.info
775170.178.168.203 - cdn1.boys4ever.info
776170.178.168.203 - ci.boys4ever.info
777170.178.168.203 - citrix.boys4ever.info
778170.178.168.203 - clients.boys4ever.info
779170.178.168.203 - cloudflare-resolve-to.boys4ever.info
780170.178.168.203 - cms.boys4ever.info
781170.178.168.203 - conference.boys4ever.info
782170.178.168.203 - community.boys4ever.info
783170.178.168.203 - config.boys4ever.info
784170.178.168.203 - contact.boys4ever.info
785170.178.168.203 - connect.boys4ever.info
786170.178.168.203 - contacts.boys4ever.info
787170.178.168.203 - controlpanel.boys4ever.info
788170.178.168.203 - content.boys4ever.info
789170.178.168.203 - control.boys4ever.info
790170.178.168.203 - controller.boys4ever.info
791170.178.168.203 - corporate.boys4ever.info
792170.178.168.203 - correo.boys4ever.info
793170.178.168.203 - cpanel.boys4ever.info
794170.178.168.203 - crm.boys4ever.info
795170.178.168.203 - customers.boys4ever.info
796170.178.168.203 - data.boys4ever.info
797170.178.168.203 - db.boys4ever.info
798170.178.168.203 - dbadmin.boys4ever.info
799170.178.168.203 - dc.boys4ever.info
800170.178.168.203 - default.boys4ever.info
801170.178.168.203 - demo.boys4ever.info
802170.178.168.203 - demostration.boys4ever.info
803170.178.168.203 - dev.boys4ever.info
804170.178.168.203 - dev2.boys4ever.info
805170.178.168.203 - dev1.boys4ever.info
806170.178.168.203 - development.boys4ever.info
807170.178.168.203 - dl.boys4ever.info
808170.178.168.203 - dmz.boys4ever.info
809170.178.168.203 - dns1.boys4ever.info
810170.178.168.203 - dns2.boys4ever.info
811170.178.168.203 - dns4.boys4ever.info
812170.178.168.203 - dns3.boys4ever.info
813170.178.168.203 - docs.boys4ever.info
814170.178.168.203 - doc.boys4ever.info
815170.178.168.203 - domainadmin.boys4ever.info
816170.178.168.203 - domain-controller.boys4ever.info
817170.178.168.203 - domaincontrolpanel.boys4ever.info
818170.178.168.203 - domainmanagement.boys4ever.info
819170.178.168.203 - domains.boys4ever.info
820170.178.168.203 - downloads.boys4ever.info
821170.178.168.203 - echo.boys4ever.info
822170.178.168.203 - ecommerce.boys4ever.info
823170.178.168.203 - elearning.boys4ever.info
824170.178.168.203 - eng.boys4ever.info
825170.178.168.203 - enterpriseregistration.boys4ever.info
826170.178.168.203 - erp.boys4ever.info
827170.178.168.203 - event.boys4ever.info
828170.178.168.203 - ex.boys4ever.info
829170.178.168.203 - examples.boys4ever.info
830170.178.168.203 - exchange.boys4ever.info
831170.178.168.203 - facebook.boys4ever.info
832170.178.168.203 - fb.boys4ever.info
833170.178.168.203 - feeds.boys4ever.info
834170.178.168.203 - fileserver.boys4ever.info
835170.178.168.203 - forms.boys4ever.info
836170.178.168.203 - folders.boys4ever.info
837170.178.168.203 - forums.boys4ever.info
838170.178.168.203 - fr.boys4ever.info
839170.178.168.203 - ftpadmin.boys4ever.info
840170.178.168.203 - ftp2.boys4ever.info
841170.178.168.203 - ftpd.boys4ever.info
842170.178.168.203 - g.boys4ever.info
843170.178.168.203 - gallery.boys4ever.info
844170.178.168.203 - games.boys4ever.info
845170.178.168.203 - gateway.boys4ever.info
846170.178.168.203 - gate.boys4ever.info
847170.178.168.203 - go.boys4ever.info
848170.178.168.203 - google.boys4ever.info
849170.178.168.203 - groupwise.boys4ever.info
850170.178.168.203 - gu.boys4ever.info
851170.178.168.203 - guide.boys4ever.info
852170.178.168.203 - guest.boys4ever.info
853170.178.168.203 - gw.boys4ever.info
854170.178.168.203 - helpdesk.boys4ever.info
855170.178.168.203 - heracles.boys4ever.info
856170.178.168.203 - hercules.boys4ever.info
857170.178.168.203 - homer.boys4ever.info
858170.178.168.203 - home.boys4ever.info
859170.178.168.203 - host2.boys4ever.info
860170.178.168.203 - hosting.boys4ever.info
861170.178.168.203 - hr.boys4ever.info
862170.178.168.203 - images.boys4ever.info
863170.178.168.203 - images1.boys4ever.info
864170.178.168.203 - images2.boys4ever.info
865170.178.168.203 - images5.boys4ever.info
866170.178.168.203 - images6.boys4ever.info
867170.178.168.203 - images8.boys4ever.info
868170.178.168.203 - imap.boys4ever.info
869170.178.168.203 - imap3d.boys4ever.info
870170.178.168.203 - imapd.boys4ever.info
871170.178.168.203 - img1.boys4ever.info
872170.178.168.203 - img.boys4ever.info
873170.178.168.203 - img3.boys4ever.info
874170.178.168.203 - inmuebles.boys4ever.info
875170.178.168.203 - interno.boys4ever.info
876170.178.168.203 - internal.boys4ever.info
877170.178.168.203 - intra.boys4ever.info
878170.178.168.203 - iphone.boys4ever.info
879170.178.168.203 - ipsec.boys4ever.info
880170.178.168.203 - ipmi.boys4ever.info
881170.178.168.203 - irc.boys4ever.info
882170.178.168.203 - ipv6.boys4ever.info
883170.178.168.203 - j.boys4ever.info
884170.178.168.203 - it.boys4ever.info
885170.178.168.203 - jira.boys4ever.info
886170.178.168.203 - jboss2.boys4ever.info
887170.178.168.203 - jobs.boys4ever.info
888170.178.168.203 - job.boys4ever.info
889170.178.168.203 - jp.boys4ever.info
890170.178.168.203 - js.boys4ever.info
891170.178.168.203 - jupiter.boys4ever.info
892170.178.168.203 - k.boys4ever.info
893170.178.168.203 - l.boys4ever.info
894170.178.168.203 - la.boys4ever.info
895170.178.168.203 - lab.boys4ever.info
896170.178.168.203 - laboratory.boys4ever.info
897170.178.168.203 - legacy.boys4ever.info
898170.178.168.203 - lib.boys4ever.info
899170.178.168.203 - library.boys4ever.info
900170.178.168.203 - linux.boys4ever.info
901170.178.168.203 - lists.boys4ever.info
902170.178.168.203 - live.boys4ever.info
903170.178.168.203 - lms.boys4ever.info
904170.178.168.203 - local.boys4ever.info
905170.178.168.203 - login.boys4ever.info
906170.178.168.203 - log.boys4ever.info
907170.178.168.203 - logon.boys4ever.info
908170.178.168.203 - london.boys4ever.info
909170.178.168.203 - loopback.boys4ever.info
910170.178.168.203 - love.boys4ever.info
911170.178.168.203 - m.boys4ever.info
912170.178.168.203 - m1.boys4ever.info
913170.178.168.203 - lyncdiscover.boys4ever.info
914170.178.168.203 - m2.boys4ever.info
915170.178.168.203 - mail.boys4ever.info
916170.178.168.203 - magento.boys4ever.info
917170.178.168.203 - mail2.boys4ever.info
918170.178.168.203 - mail01.boys4ever.info
919170.178.168.203 - mail4.boys4ever.info
920170.178.168.203 - mail5.boys4ever.info
921170.178.168.203 - mailbackup.boys4ever.info
922170.178.168.203 - mailgate.boys4ever.info
923170.178.168.203 - mailer.boys4ever.info
924170.178.168.203 - mailing.boys4ever.info
925170.178.168.203 - mailman.boys4ever.info
926170.178.168.203 - manage.boys4ever.info
927170.178.168.203 - mailserver.boys4ever.info
928170.178.168.203 - maps.boys4ever.info
929170.178.168.203 - market.boys4ever.info
930170.178.168.203 - mars.boys4ever.info
931170.178.168.203 - mb.boys4ever.info
932170.178.168.203 - mdm.boys4ever.info
933170.178.168.203 - members.boys4ever.info
934170.178.168.203 - member.boys4ever.info
935170.178.168.203 - meet.boys4ever.info
936170.178.168.203 - meta.boys4ever.info
937170.178.168.203 - meta02.boys4ever.info
938170.178.168.203 - meta01.boys4ever.info
939170.178.168.203 - meta03.boys4ever.info
940170.178.168.203 - meta2.boys4ever.info
941170.178.168.203 - mirror.boys4ever.info
942170.178.168.203 - mobil.boys4ever.info
943170.178.168.203 - mm.boys4ever.info
944170.178.168.203 - mob.boys4ever.info
945170.178.168.203 - monitor.boys4ever.info
946170.178.168.203 - monitoring.boys4ever.info
947170.178.168.203 - mssql.boys4ever.info
948170.178.168.203 - munin.boys4ever.info
949170.178.168.203 - mx-b.boys4ever.info
950170.178.168.203 - mx0.boys4ever.info
951170.178.168.203 - mx2.boys4ever.info
952170.178.168.203 - mx03.boys4ever.info
953170.178.168.203 - nas.boys4ever.info
954170.178.168.203 - netmail.boys4ever.info
955170.178.168.203 - net.boys4ever.info
956170.178.168.203 - network.boys4ever.info
957170.178.168.203 - news.boys4ever.info
958170.178.168.203 - newsite.boys4ever.info
959170.178.168.203 - newsletter.boys4ever.info
960170.178.168.203 - nl.boys4ever.info
961170.178.168.203 - ns.boys4ever.info
962170.178.168.203 - ns1.boys4ever.info
963170.178.168.203 - ns0.boys4ever.info
964170.178.168.203 - ns01.boys4ever.info
965170.178.168.203 - ns3.boys4ever.info
966170.178.168.203 - ns12.boys4ever.info
967170.178.168.203 - ns6.boys4ever.info
968170.178.168.203 - ns5.boys4ever.info
969170.178.168.203 - ns8.boys4ever.info
970170.178.168.203 - ns7.boys4ever.info
971170.178.168.203 - o.boys4ever.info
972170.178.168.203 - old.boys4ever.info
973170.178.168.203 - office2.boys4ever.info
974170.178.168.203 - online.boys4ever.info
975170.178.168.203 - ops.boys4ever.info
976170.178.168.203 - os.boys4ever.info
977170.178.168.203 - osx.boys4ever.info
978170.178.168.203 - outgoing.boys4ever.info
979170.178.168.203 - ox.boys4ever.info
980170.178.168.203 - owa.boys4ever.info
981170.178.168.203 - partner.boys4ever.info
982170.178.168.203 - painel.boys4ever.info
983170.178.168.203 - panel.boys4ever.info
984170.178.168.203 - partners.boys4ever.info
985170.178.168.203 - pay.boys4ever.info
986170.178.168.203 - pbx.boys4ever.info
987170.178.168.203 - payment.boys4ever.info
988170.178.168.203 - payments.boys4ever.info
989170.178.168.203 - pegasus.boys4ever.info
990170.178.168.203 - pcanywhere.boys4ever.info
991170.178.168.203 - pendrell.boys4ever.info
992170.178.168.203 - personal.boys4ever.info
993170.178.168.203 - php.boys4ever.info
994170.178.168.203 - phpmyadmin.boys4ever.info
995170.178.168.203 - photos.boys4ever.info
996170.178.168.203 - pm.boys4ever.info
997170.178.168.203 - pop.boys4ever.info
998170.178.168.203 - poczta.boys4ever.info
999170.178.168.203 - postman.boys4ever.info
1000170.178.168.203 - pre-production.boys4ever.info
1001170.178.168.203 - press.boys4ever.info
1002170.178.168.203 - preview.boys4ever.info
1003170.178.168.203 - prod.boys4ever.info
1004170.178.168.203 - proxy.boys4ever.info
1005170.178.168.203 - pt.boys4ever.info
1006170.178.168.203 - pruebas.boys4ever.info
1007170.178.168.203 - prueba.boys4ever.info
1008170.178.168.203 - q.boys4ever.info
1009170.178.168.203 - ra.boys4ever.info
1010170.178.168.203 - ras.boys4ever.info
1011170.178.168.203 - redirect.boys4ever.info
1012170.178.168.203 - remote2.boys4ever.info
1013170.178.168.203 - relay.boys4ever.info
1014170.178.168.203 - redmine.boys4ever.info
1015170.178.168.203 - register.boys4ever.info
1016170.178.168.203 - restricted.boys4ever.info
1017170.178.168.203 - root.boys4ever.info
1018170.178.168.203 - ru.boys4ever.info
1019170.178.168.203 - rtmp.boys4ever.info
1020170.178.168.203 - s2.boys4ever.info
1021170.178.168.203 - s3.boys4ever.info
1022170.178.168.203 - sa.boys4ever.info
1023170.178.168.203 - s4.boys4ever.info
1024170.178.168.203 - sandbox.boys4ever.info
1025170.178.168.203 - security.boys4ever.info
1026170.178.168.203 - share.boys4ever.info
1027170.178.168.203 - sharepoint.boys4ever.info
1028170.178.168.203 - shop.boys4ever.info
1029170.178.168.203 - shell.boys4ever.info
1030170.178.168.203 - sip.boys4ever.info
1031170.178.168.203 - site.boys4ever.info
1032170.178.168.203 - sms.boys4ever.info
1033170.178.168.203 - smtp.boys4ever.info
1034170.178.168.203 - snmp.boys4ever.info
1035170.178.168.203 - solaris.boys4ever.info
1036170.178.168.203 - social.boys4ever.info
1037170.178.168.203 - sp.boys4ever.info
1038170.178.168.203 - speedtest.boys4ever.info
1039170.178.168.203 - sports.boys4ever.info
1040170.178.168.203 - squirrelmail.boys4ever.info
1041170.178.168.203 - ssh.boys4ever.info
1042170.178.168.203 - sslvpn.boys4ever.info
1043170.178.168.203 - ssl.boys4ever.info
1044170.178.168.203 - st.boys4ever.info
1045170.178.168.203 - static.boys4ever.info
1046170.178.168.203 - stat.boys4ever.info
1047170.178.168.203 - stats.boys4ever.info
1048170.178.168.203 - static1.boys4ever.info
1049170.178.168.203 - support.boys4ever.info
1050170.178.168.203 - survey.boys4ever.info
1051170.178.168.203 - sv.boys4ever.info
1052170.178.168.203 - svn.boys4ever.info
1053170.178.168.203 - t.boys4ever.info
1054170.178.168.203 - telewerk.boys4ever.info
1055170.178.168.203 - test.boys4ever.info
1056170.178.168.203 - test2.boys4ever.info
1057170.178.168.203 - test3.boys4ever.info
1058170.178.168.203 - testing.boys4ever.info
1059170.178.168.203 - tfs.boys4ever.info
1060170.178.168.203 - testsite.boys4ever.info
1061170.178.168.203 - tftp.boys4ever.info
1062170.178.168.203 - ticket.boys4ever.info
1063170.178.168.203 - trac.boys4ever.info
1064170.178.168.203 - training.boys4ever.info
1065170.178.168.203 - tutorials.boys4ever.info
1066170.178.168.203 - tv.boys4ever.info
1067170.178.168.203 - tw.boys4ever.info
1068170.178.168.203 - u.boys4ever.info
1069170.178.168.203 - uk.boys4ever.info
1070170.178.168.203 - unix.boys4ever.info
1071170.178.168.203 - us.boys4ever.info
1072170.178.168.203 - uploads.boys4ever.info
1073170.178.168.203 - ventas.boys4ever.info
1074170.178.168.203 - vc.boys4ever.info
1075170.178.168.203 - v2.boys4ever.info
1076170.178.168.203 - virtual.boys4ever.info
1077170.178.168.203 - vle.boys4ever.info
1078170.178.168.203 - vista.boys4ever.info
1079170.178.168.203 - vm.boys4ever.info
1080170.178.168.203 - vmware.boys4ever.info
1081170.178.168.203 - vnc.boys4ever.info
1082170.178.168.203 - vod.boys4ever.info
1083170.178.168.203 - vpn.boys4ever.info
1084170.178.168.203 - w3.boys4ever.info
1085170.178.168.203 - w.boys4ever.info
1086170.178.168.203 - web03.boys4ever.info
1087170.178.168.203 - web02.boys4ever.info
1088170.178.168.203 - web1.boys4ever.info
1089170.178.168.203 - web4.boys4ever.info
1090170.178.168.203 - webconf.boys4ever.info
1091170.178.168.203 - webcam.boys4ever.info
1092170.178.168.203 - webmail.boys4ever.info
1093170.178.168.203 - webdb.boys4ever.info
1094170.178.168.203 - weblog.boys4ever.info
1095170.178.168.203 - webdisk.boys4ever.info
1096170.178.168.203 - webmaster.boys4ever.info
1097170.178.168.203 - webservices.boys4ever.info
1098170.178.168.203 - webmin.boys4ever.info
1099170.178.168.203 - webstore.boys4ever.info
1100170.178.168.203 - whm.boys4ever.info
1101170.178.168.203 - win.boys4ever.info
1102170.178.168.203 - win32.boys4ever.info
1103170.178.168.203 - wp.boys4ever.info
1104170.178.168.203 - ww.boys4ever.info
110591.195.240.46 - ww1.boys4ever.info
1106170.178.168.203 - www.boys4ever.info
1107170.178.168.203 - ww03.boys4ever.info
1108170.178.168.203 - ww3.boys4ever.info
1109141.8.224.195 - ww2.boys4ever.info
1110170.178.168.203 - www2.boys4ever.info
1111170.178.168.203 - www0.boys4ever.info
1112170.178.168.203 - www02.boys4ever.info
1113170.178.168.203 - www4.boys4ever.info
1114170.178.168.203 - www7.boys4ever.info
1115170.178.168.203 - www6.boys4ever.info
1116170.178.168.203 - wwwold.boys4ever.info
1117170.178.168.203 - zabbix.boys4ever.info
1118170.178.168.203 - zeus.boys4ever.info
1119##################################################################################################################################
1120Domains still to check: 1
1121 Checking if the hostname boys4ever.info. given is in fact a domain...
1122
1123Analyzing domain: boys4ever.info.
1124 Checking NameServers using system default resolver...
1125 IP: 103.224.182.5 (Australia)
1126 HostName: ns15.above.com Type: NS
1127 HostName: ns1.above.com Type: PTR
1128 IP: 103.224.212.5 (Australia)
1129 HostName: ns15.above.com Type: NS
1130 HostName: ns1.above.com Type: PTR
1131 IP: 103.224.212.6 (Australia)
1132 HostName: ns16.above.com Type: NS
1133 HostName: ns2.above.com Type: PTR
1134 IP: 103.224.182.6 (Australia)
1135 HostName: ns16.above.com Type: NS
1136 HostName: ns2.above.com Type: PTR
1137
1138 Checking MailServers using system default resolver...
1139 IP: 103.224.212.34 (Australia)
1140 HostName: park-mx.above.com Type: MX
1141 HostName: park-mx.above.com Type: PTR
1142 WARNING!! This domain has wildcards activated for hostnames resolution. We are checking "www" anyway, but perhaps it doesn't exists!
1143
1144 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1145 No zone transfer found on nameserver 103.224.182.6
1146 No zone transfer found on nameserver 103.224.212.5
1147 No zone transfer found on nameserver 103.224.212.6
1148 No zone transfer found on nameserver 103.224.182.5
1149
1150 Checking SPF record...
1151 No SPF record
1152
1153 Checking 1 most common hostnames using system default resolver...
1154 IP: 170.178.168.203 (United States)
1155 Sub Domain: www.boys4ever.info. <- New Subdomain!
1156 HostName: www.boys4ever.info. Type: A
1157 HostName: becrawl-show.flatreutic.com Type: PTR
1158
1159 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1160 Checking netblock 170.178.168.0
1161 Checking netblock 103.224.212.0
1162 Checking netblock 103.224.182.0
1163
1164 Searching for boys4ever.info. emails in Google
1165
1166 Checking 6 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1167 Host 170.178.168.203 is up (reset ttl 64)
1168 Host 103.224.212.34 is up (reset ttl 64)
1169 Host 103.224.212.6 is up (reset ttl 64)
1170 Host 103.224.182.5 is up (reset ttl 64)
1171 Host 103.224.182.6 is up (reset ttl 64)
1172 Host 103.224.212.5 is up (reset ttl 64)
1173
1174 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1175 Scanning ip 170.178.168.203 (becrawl-show.flatreutic.com (PTR)):
1176 Scanning ip 103.224.212.34 (park-mx.above.com (PTR)):
1177 111/tcp open rpcbind syn-ack ttl 45 2-4 (RPC #100000)
1178 | rpcinfo:
1179 | program version port/proto service
1180 | 100000 2,3,4 111/tcp rpcbind
1181 | 100000 2,3,4 111/udp rpcbind
1182 | 100000 3,4 111/tcp6 rpcbind
1183 | 100000 3,4 111/udp6 rpcbind
1184 | 100024 1 38167/tcp status
1185 | 100024 1 41422/tcp6 status
1186 | 100024 1 44706/udp6 status
1187 |_ 100024 1 56225/udp status
1188 Scanning ip 103.224.212.6 (ns2.above.com (PTR)):
1189 53/tcp open domain syn-ack ttl 46 PowerDNS Authoritative Server 4.0.3
1190 | dns-nsid:
1191 | NSID: pns04-san (706e7330342d73616e)
1192 | id.server: pns04-san
1193 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1194 | vulners:
1195 | cpe:/a:powerdns:authoritative:4.0.3:
1196 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1197 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1198 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1199 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1200 Device type: general purpose|storage-misc|broadband router|WAP
1201 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%)
1202 Scanning ip 103.224.182.5 (ns1.above.com (PTR)):
1203 53/tcp open domain syn-ack ttl 44 PowerDNS Authoritative Server 4.0.3
1204 | dns-nsid:
1205 | NSID: pns01-san (706e7330312d73616e)
1206 | id.server: pns01-san
1207 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1208 | vulners:
1209 | cpe:/a:powerdns:authoritative:4.0.3:
1210 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1211 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1212 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1213 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1214 Device type: general purpose|storage-misc|broadband router|WAP|phone
1215 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1216 Scanning ip 103.224.182.6 (ns2.above.com (PTR)):
1217 53/tcp open domain syn-ack ttl 45 PowerDNS Authoritative Server 4.0.3
1218 | dns-nsid:
1219 | NSID: pns03-san (706e7330332d73616e)
1220 | id.server: pns03-san
1221 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1222 | vulners:
1223 | cpe:/a:powerdns:authoritative:4.0.3:
1224 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1225 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1226 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1227 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1228 Device type: general purpose|storage-misc|broadband router|WAP|phone
1229 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1230 Scanning ip 103.224.212.5 (ns1.above.com (PTR)):
1231 53/tcp open domain syn-ack ttl 46 PowerDNS Authoritative Server 4.0.3
1232 | dns-nsid:
1233 | NSID: pns02-san (706e7330322d73616e)
1234 | id.server: pns02-san
1235 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1236 | vulners:
1237 | cpe:/a:powerdns:authoritative:4.0.3:
1238 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1239 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1240 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1241 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1242 Device type: general purpose|storage-misc|broadband router|WAP|phone
1243 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1244 WebCrawling domain's web servers... up to 50 max links.
1245--Finished--
1246Summary information for domain boys4ever.info.
1247-----------------------------------------
1248
1249 Domain Ips Information:
1250 IP: 170.178.168.203
1251 Sub Domain: www.boys4ever.info.
1252 HostName: www.boys4ever.info. Type: A
1253 HostName: becrawl-show.flatreutic.com Type: PTR
1254 Country: United States
1255 Is Active: True (reset ttl 64)
1256 IP: 103.224.212.34
1257 HostName: park-mx.above.com Type: MX
1258 HostName: park-mx.above.com Type: PTR
1259 Country: Australia
1260 Is Active: True (reset ttl 64)
1261 Port: 111/tcp open rpcbind syn-ack ttl 45 2-4 (RPC #100000)
1262 Script Info: | rpcinfo:
1263 Script Info: | program version port/proto service
1264 Script Info: | 100000 2,3,4 111/tcp rpcbind
1265 Script Info: | 100000 2,3,4 111/udp rpcbind
1266 Script Info: | 100000 3,4 111/tcp6 rpcbind
1267 Script Info: | 100000 3,4 111/udp6 rpcbind
1268 Script Info: | 100024 1 38167/tcp status
1269 Script Info: | 100024 1 41422/tcp6 status
1270 Script Info: | 100024 1 44706/udp6 status
1271 Script Info: |_ 100024 1 56225/udp status
1272 IP: 103.224.212.6
1273 HostName: ns16.above.com Type: NS
1274 HostName: ns2.above.com Type: PTR
1275 Country: Australia
1276 Is Active: True (reset ttl 64)
1277 Port: 53/tcp open domain syn-ack ttl 46 PowerDNS Authoritative Server 4.0.3
1278 Script Info: | dns-nsid:
1279 Script Info: | NSID: pns04-san (706e7330342d73616e)
1280 Script Info: | id.server: pns04-san
1281 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1282 Script Info: | vulners:
1283 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1284 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1285 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1286 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1287 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1288 Script Info: Device type: general purpose|storage-misc|broadband router|WAP
1289 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%)
1290 IP: 103.224.182.5
1291 HostName: ns15.above.com Type: NS
1292 HostName: ns1.above.com Type: PTR
1293 Country: Australia
1294 Is Active: True (reset ttl 64)
1295 Port: 53/tcp open domain syn-ack ttl 44 PowerDNS Authoritative Server 4.0.3
1296 Script Info: | dns-nsid:
1297 Script Info: | NSID: pns01-san (706e7330312d73616e)
1298 Script Info: | id.server: pns01-san
1299 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1300 Script Info: | vulners:
1301 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1302 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1303 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1304 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1305 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1306 Script Info: Device type: general purpose|storage-misc|broadband router|WAP|phone
1307 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1308 IP: 103.224.182.6
1309 HostName: ns16.above.com Type: NS
1310 HostName: ns2.above.com Type: PTR
1311 Country: Australia
1312 Is Active: True (reset ttl 64)
1313 Port: 53/tcp open domain syn-ack ttl 45 PowerDNS Authoritative Server 4.0.3
1314 Script Info: | dns-nsid:
1315 Script Info: | NSID: pns03-san (706e7330332d73616e)
1316 Script Info: | id.server: pns03-san
1317 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1318 Script Info: | vulners:
1319 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1320 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1321 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1322 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1323 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1324 Script Info: Device type: general purpose|storage-misc|broadband router|WAP|phone
1325 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1326 IP: 103.224.212.5
1327 HostName: ns15.above.com Type: NS
1328 HostName: ns1.above.com Type: PTR
1329 Country: Australia
1330 Is Active: True (reset ttl 64)
1331 Port: 53/tcp open domain syn-ack ttl 46 PowerDNS Authoritative Server 4.0.3
1332 Script Info: | dns-nsid:
1333 Script Info: | NSID: pns02-san (706e7330322d73616e)
1334 Script Info: | id.server: pns02-san
1335 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1336 Script Info: | vulners:
1337 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1338 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1339 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1340 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1341 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1342 Script Info: Device type: general purpose|storage-misc|broadband router|WAP|phone
1343 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1344
1345--------------End Summary --------------
1346-----------------------------------------
1347
1348
1349
1350 Checking if the hostname www.boys4ever.info. given is in fact a domain...
1351
1352Analyzing domain: www.boys4ever.info.
1353 Checking NameServers using system default resolver...
1354 IP: 103.224.212.6 (Australia)
1355 HostName: ns2.above.com Type: NS
1356 HostName: ns2.above.com Type: PTR
1357 IP: 103.224.182.6 (Australia)
1358 HostName: ns2.above.com Type: NS
1359 HostName: ns2.above.com Type: PTR
1360 IP: 103.224.182.5 (Australia)
1361 HostName: ns1.above.com Type: NS
1362 HostName: ns1.above.com Type: PTR
1363 IP: 103.224.212.5 (Australia)
1364 HostName: ns1.above.com Type: NS
1365 HostName: ns1.above.com Type: PTR
1366
1367 Checking MailServers using system default resolver...
1368 IP: 103.224.212.34 (Australia)
1369 HostName: park-mx.above.com Type: MX
1370 HostName: park-mx.above.com Type: PTR
1371 WARNING!! This domain has wildcards activated for hostnames resolution. We are checking "www" anyway, but perhaps it doesn't exists!
1372
1373 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1374 No zone transfer found on nameserver 103.224.182.6
1375 No zone transfer found on nameserver 103.224.212.5
1376 No zone transfer found on nameserver 103.224.212.6
1377 No zone transfer found on nameserver 103.224.182.5
1378
1379 Checking SPF record...
1380 No SPF record
1381
1382 Checking 1 most common hostnames using system default resolver...
1383 WARNING! Recursive domains detected. Not adding them to the check list.
1384 IP: 170.178.168.203 (United States)
1385 HostName: www.www.boys4ever.info. Type: A
1386
1387 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1388 Checking netblock 170.178.168.0
1389 Checking netblock 103.224.212.0
1390 Checking netblock 103.224.182.0
1391
1392 Searching for www.boys4ever.info. emails in Google
1393
1394 Checking 6 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1395 Host 170.178.168.203 is up (reset ttl 64)
1396 Host 103.224.212.34 is up (reset ttl 64)
1397 Host 103.224.212.6 is up (reset ttl 64)
1398 Host 103.224.182.5 is up (reset ttl 64)
1399 Host 103.224.182.6 is up (reset ttl 64)
1400 Host 103.224.212.5 is up (reset ttl 64)
1401
1402 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1403 Scanning ip 170.178.168.203 (www.www.boys4ever.info.):
1404 53/tcp open domain syn-ack ttl 55 PowerDNS Authoritative Server 4.0.3
1405 | dns-nsid:
1406 | NSID: ddos01-ext (64646f7330312d657874)
1407 | id.server: ddos01-ext
1408 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1409 | vulners:
1410 | cpe:/a:powerdns:authoritative:4.0.3:
1411 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1412 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1413 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1414 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1415 80/tcp open http syn-ack ttl 55 Apache httpd 2.4.25 ((Debian))
1416 | http-methods:
1417 |_ Supported Methods: GET HEAD POST
1418 | http-robots.txt: 5 disallowed entries
1419 | /cpx.php /medios1.php /toolbar.php /check_image.php
1420 |_/check_popunder.php
1421 |_http-server-header: Apache/2.4.25 (Debian)
1422 |_http-title: 168.203
1423 | vulners:
1424 | cpe:/a:apache:http_server:2.4.25:
1425 | CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
1426 | CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
1427 | CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
1428 | CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
1429 | CVE-2019-0211 7.2 https://vulners.com/cve/CVE-2019-0211
1430 | CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
1431 | CVE-2017-15715 6.8 https://vulners.com/cve/CVE-2017-15715
1432 | CVE-2019-10082 6.4 https://vulners.com/cve/CVE-2019-10082
1433 | CVE-2017-9788 6.4 https://vulners.com/cve/CVE-2017-9788
1434 | CVE-2019-0217 6.0 https://vulners.com/cve/CVE-2019-0217
1435 | CVE-2019-10098 5.8 https://vulners.com/cve/CVE-2019-10098
1436 | CVE-2019-10081 5.0 https://vulners.com/cve/CVE-2019-10081
1437 | CVE-2019-0220 5.0 https://vulners.com/cve/CVE-2019-0220
1438 | CVE-2019-0196 5.0 https://vulners.com/cve/CVE-2019-0196
1439 | CVE-2018-17199 5.0 https://vulners.com/cve/CVE-2018-17199
1440 | CVE-2018-1333 5.0 https://vulners.com/cve/CVE-2018-1333
1441 | CVE-2017-9798 5.0 https://vulners.com/cve/CVE-2017-9798
1442 | CVE-2017-7659 5.0 https://vulners.com/cve/CVE-2017-7659
1443 | CVE-2017-15710 5.0 https://vulners.com/cve/CVE-2017-15710
1444 | CVE-2019-0197 4.9 https://vulners.com/cve/CVE-2019-0197
1445 | CVE-2019-10092 4.3 https://vulners.com/cve/CVE-2019-10092
1446 | CVE-2018-11763 4.3 https://vulners.com/cve/CVE-2018-11763
1447 |_ CVE-2018-1283 3.5 https://vulners.com/cve/CVE-2018-1283
1448 443/tcp open ssl/http syn-ack ttl 55 Apache httpd 2.4.25 ((Debian))
1449 | http-methods:
1450 |_ Supported Methods: GET
1451 | http-robots.txt: 5 disallowed entries
1452 | /cpx.php /medios1.php /toolbar.php /check_image.php
1453 |_/check_popunder.php
1454 |_http-title: 168.203
1455 | ssl-cert: Subject: commonName=park.above.com
1456 | Subject Alternative Name: DNS:*.park.above.com, DNS:park.above.com
1457 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1458 | Public Key type: rsa
1459 | Public Key bits: 4096
1460 | Signature Algorithm: sha256WithRSAEncryption
1461 | Not valid before: 2018-12-12T00:17:28
1462 | Not valid after: 2019-03-12T00:17:28
1463 | MD5: 8a92 dfb9 78e1 4bfe 079e 917e 217f 0965
1464 |_SHA-1: 33f4 585c a225 85ac 919d 1359 56c6 d134 4b6f 6599
1465 |_ssl-date: TLS randomness does not represent time
1466 Device type: general purpose|storage-misc|broadband router|WAP|phone
1467 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1468 Scanning ip 103.224.212.34 (park-mx.above.com (PTR)):
1469 111/tcp open rpcbind syn-ack ttl 45 2-4 (RPC #100000)
1470 | rpcinfo:
1471 | program version port/proto service
1472 | 100000 2,3,4 111/tcp rpcbind
1473 | 100000 2,3,4 111/udp rpcbind
1474 | 100000 3,4 111/tcp6 rpcbind
1475 | 100000 3,4 111/udp6 rpcbind
1476 | 100024 1 38167/tcp status
1477 | 100024 1 41422/tcp6 status
1478 | 100024 1 44706/udp6 status
1479 |_ 100024 1 56225/udp status
1480 Scanning ip 103.224.212.6 (ns2.above.com (PTR)):
1481 53/tcp open domain syn-ack ttl 44 PowerDNS Authoritative Server 4.0.3
1482 | dns-nsid:
1483 | NSID: pns04-san (706e7330342d73616e)
1484 | id.server: pns04-san
1485 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1486 | vulners:
1487 | cpe:/a:powerdns:authoritative:4.0.3:
1488 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1489 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1490 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1491 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1492 Scanning ip 103.224.182.5 (ns1.above.com (PTR)):
1493 53/tcp open domain syn-ack ttl 46 PowerDNS Authoritative Server 4.0.3
1494 | dns-nsid:
1495 | NSID: pns01-san (706e7330312d73616e)
1496 | id.server: pns01-san
1497 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1498 | vulners:
1499 | cpe:/a:powerdns:authoritative:4.0.3:
1500 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1501 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1502 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1503 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1504 Device type: general purpose|storage-misc|broadband router|WAP|phone
1505 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1506 Scanning ip 103.224.182.6 (ns2.above.com (PTR)):
1507 53/tcp open domain syn-ack ttl 45 PowerDNS Authoritative Server 4.0.3
1508 | dns-nsid:
1509 | NSID: pns03-san (706e7330332d73616e)
1510 | id.server: pns03-san
1511 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1512 | vulners:
1513 | cpe:/a:powerdns:authoritative:4.0.3:
1514 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1515 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1516 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1517 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1518 Device type: general purpose|storage-misc|broadband router|WAP|phone
1519 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1520 Scanning ip 103.224.212.5 (ns1.above.com (PTR)):
1521 53/tcp open domain syn-ack ttl 44 PowerDNS Authoritative Server 4.0.3
1522 | dns-nsid:
1523 | NSID: pns02-san (706e7330322d73616e)
1524 | id.server: pns02-san
1525 |_ bind.version: PowerDNS Authoritative Server 4.0.3
1526 | vulners:
1527 | cpe:/a:powerdns:authoritative:4.0.3:
1528 | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1529 | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1530 | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1531 |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1532 Device type: general purpose|storage-misc|broadband router|WAP
1533 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X|2.4.X (93%), HP embedded (91%)
1534 WebCrawling domain's web servers... up to 50 max links.
1535
1536 + URL to crawl: http://www.www.boys4ever.info.
1537 + Date: 2020-02-10
1538
1539 + Crawling URL: http://www.www.boys4ever.info.:
1540 + Links:
1541 + Crawling http://www.www.boys4ever.info.
1542 + Searching for directories...
1543 + Searching open folders...
1544
1545
1546 + URL to crawl: https://www.www.boys4ever.info.
1547 + Date: 2020-02-10
1548
1549 + Crawling URL: https://www.www.boys4ever.info.:
1550 + Links:
1551 + Crawling https://www.www.boys4ever.info. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1552 + Searching for directories...
1553 + Searching open folders...
1554
1555--Finished--
1556Summary information for domain www.boys4ever.info.
1557-----------------------------------------
1558
1559 Domain Ips Information:
1560 IP: 170.178.168.203
1561 HostName: www.www.boys4ever.info. Type: A
1562 Country: United States
1563 Is Active: True (reset ttl 64)
1564 Port: 53/tcp open domain syn-ack ttl 55 PowerDNS Authoritative Server 4.0.3
1565 Script Info: | dns-nsid:
1566 Script Info: | NSID: ddos01-ext (64646f7330312d657874)
1567 Script Info: | id.server: ddos01-ext
1568 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1569 Script Info: | vulners:
1570 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1571 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1572 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1573 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1574 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1575 Port: 80/tcp open http syn-ack ttl 55 Apache httpd 2.4.25 ((Debian))
1576 Script Info: | http-methods:
1577 Script Info: |_ Supported Methods: GET HEAD POST
1578 Script Info: | http-robots.txt: 5 disallowed entries
1579 Script Info: | /cpx.php /medios1.php /toolbar.php /check_image.php
1580 Script Info: |_/check_popunder.php
1581 Script Info: |_http-server-header: Apache/2.4.25 (Debian)
1582 Script Info: |_http-title: 168.203
1583 Script Info: | vulners:
1584 Script Info: | cpe:/a:apache:http_server:2.4.25:
1585 Script Info: | CVE-2017-7679 7.5 https://vulners.com/cve/CVE-2017-7679
1586 Script Info: | CVE-2017-7668 7.5 https://vulners.com/cve/CVE-2017-7668
1587 Script Info: | CVE-2017-3169 7.5 https://vulners.com/cve/CVE-2017-3169
1588 Script Info: | CVE-2017-3167 7.5 https://vulners.com/cve/CVE-2017-3167
1589 Script Info: | CVE-2019-0211 7.2 https://vulners.com/cve/CVE-2019-0211
1590 Script Info: | CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
1591 Script Info: | CVE-2017-15715 6.8 https://vulners.com/cve/CVE-2017-15715
1592 Script Info: | CVE-2019-10082 6.4 https://vulners.com/cve/CVE-2019-10082
1593 Script Info: | CVE-2017-9788 6.4 https://vulners.com/cve/CVE-2017-9788
1594 Script Info: | CVE-2019-0217 6.0 https://vulners.com/cve/CVE-2019-0217
1595 Script Info: | CVE-2019-10098 5.8 https://vulners.com/cve/CVE-2019-10098
1596 Script Info: | CVE-2019-10081 5.0 https://vulners.com/cve/CVE-2019-10081
1597 Script Info: | CVE-2019-0220 5.0 https://vulners.com/cve/CVE-2019-0220
1598 Script Info: | CVE-2019-0196 5.0 https://vulners.com/cve/CVE-2019-0196
1599 Script Info: | CVE-2018-17199 5.0 https://vulners.com/cve/CVE-2018-17199
1600 Script Info: | CVE-2018-1333 5.0 https://vulners.com/cve/CVE-2018-1333
1601 Script Info: | CVE-2017-9798 5.0 https://vulners.com/cve/CVE-2017-9798
1602 Script Info: | CVE-2017-7659 5.0 https://vulners.com/cve/CVE-2017-7659
1603 Script Info: | CVE-2017-15710 5.0 https://vulners.com/cve/CVE-2017-15710
1604 Script Info: | CVE-2019-0197 4.9 https://vulners.com/cve/CVE-2019-0197
1605 Script Info: | CVE-2019-10092 4.3 https://vulners.com/cve/CVE-2019-10092
1606 Script Info: | CVE-2018-11763 4.3 https://vulners.com/cve/CVE-2018-11763
1607 Script Info: |_ CVE-2018-1283 3.5 https://vulners.com/cve/CVE-2018-1283
1608 Port: 443/tcp open ssl/http syn-ack ttl 55 Apache httpd 2.4.25 ((Debian))
1609 Script Info: | http-methods:
1610 Script Info: |_ Supported Methods: GET
1611 Script Info: | http-robots.txt: 5 disallowed entries
1612 Script Info: | /cpx.php /medios1.php /toolbar.php /check_image.php
1613 Script Info: |_/check_popunder.php
1614 Script Info: |_http-title: 168.203
1615 Script Info: | ssl-cert: Subject: commonName=park.above.com
1616 Script Info: | Subject Alternative Name: DNS:*.park.above.com, DNS:park.above.com
1617 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1618 Script Info: | Public Key type: rsa
1619 Script Info: | Public Key bits: 4096
1620 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1621 Script Info: | Not valid before: 2018-12-12T00:17:28
1622 Script Info: | Not valid after: 2019-03-12T00:17:28
1623 Script Info: | MD5: 8a92 dfb9 78e1 4bfe 079e 917e 217f 0965
1624 Script Info: |_SHA-1: 33f4 585c a225 85ac 919d 1359 56c6 d134 4b6f 6599
1625 Script Info: |_ssl-date: TLS randomness does not represent time
1626 Script Info: Device type: general purpose|storage-misc|broadband router|WAP|phone
1627 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1628 IP: 103.224.212.34
1629 HostName: park-mx.above.com Type: MX
1630 HostName: park-mx.above.com Type: PTR
1631 Country: Australia
1632 Is Active: True (reset ttl 64)
1633 Port: 111/tcp open rpcbind syn-ack ttl 45 2-4 (RPC #100000)
1634 Script Info: | rpcinfo:
1635 Script Info: | program version port/proto service
1636 Script Info: | 100000 2,3,4 111/tcp rpcbind
1637 Script Info: | 100000 2,3,4 111/udp rpcbind
1638 Script Info: | 100000 3,4 111/tcp6 rpcbind
1639 Script Info: | 100000 3,4 111/udp6 rpcbind
1640 Script Info: | 100024 1 38167/tcp status
1641 Script Info: | 100024 1 41422/tcp6 status
1642 Script Info: | 100024 1 44706/udp6 status
1643 Script Info: |_ 100024 1 56225/udp status
1644 IP: 103.224.212.6
1645 HostName: ns2.above.com Type: NS
1646 HostName: ns2.above.com Type: PTR
1647 Country: Australia
1648 Is Active: True (reset ttl 64)
1649 Port: 53/tcp open domain syn-ack ttl 44 PowerDNS Authoritative Server 4.0.3
1650 Script Info: | dns-nsid:
1651 Script Info: | NSID: pns04-san (706e7330342d73616e)
1652 Script Info: | id.server: pns04-san
1653 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1654 Script Info: | vulners:
1655 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1656 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1657 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1658 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1659 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1660 IP: 103.224.182.5
1661 HostName: ns1.above.com Type: NS
1662 HostName: ns1.above.com Type: PTR
1663 Country: Australia
1664 Is Active: True (reset ttl 64)
1665 Port: 53/tcp open domain syn-ack ttl 46 PowerDNS Authoritative Server 4.0.3
1666 Script Info: | dns-nsid:
1667 Script Info: | NSID: pns01-san (706e7330312d73616e)
1668 Script Info: | id.server: pns01-san
1669 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1670 Script Info: | vulners:
1671 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1672 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1673 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1674 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1675 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1676 Script Info: Device type: general purpose|storage-misc|broadband router|WAP|phone
1677 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1678 IP: 103.224.182.6
1679 HostName: ns2.above.com Type: NS
1680 HostName: ns2.above.com Type: PTR
1681 Country: Australia
1682 Is Active: True (reset ttl 64)
1683 Port: 53/tcp open domain syn-ack ttl 45 PowerDNS Authoritative Server 4.0.3
1684 Script Info: | dns-nsid:
1685 Script Info: | NSID: pns03-san (706e7330332d73616e)
1686 Script Info: | id.server: pns03-san
1687 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1688 Script Info: | vulners:
1689 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1690 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1691 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1692 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1693 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1694 Script Info: Device type: general purpose|storage-misc|broadband router|WAP|phone
1695 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1696 IP: 103.224.212.5
1697 HostName: ns1.above.com Type: NS
1698 HostName: ns1.above.com Type: PTR
1699 Country: Australia
1700 Is Active: True (reset ttl 64)
1701 Port: 53/tcp open domain syn-ack ttl 44 PowerDNS Authoritative Server 4.0.3
1702 Script Info: | dns-nsid:
1703 Script Info: | NSID: pns02-san (706e7330322d73616e)
1704 Script Info: | id.server: pns02-san
1705 Script Info: |_ bind.version: PowerDNS Authoritative Server 4.0.3
1706 Script Info: | vulners:
1707 Script Info: | cpe:/a:powerdns:authoritative:4.0.3:
1708 Script Info: | CVE-2017-15091 5.5 https://vulners.com/cve/CVE-2017-15091
1709 Script Info: | CVE-2019-10162 5.0 https://vulners.com/cve/CVE-2019-10162
1710 Script Info: | CVE-2018-10851 5.0 https://vulners.com/cve/CVE-2018-10851
1711 Script Info: |_ CVE-2019-10163 4.0 https://vulners.com/cve/CVE-2019-10163
1712 Script Info: Device type: general purpose|storage-misc|broadband router|WAP
1713 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X|2.4.X (93%), HP embedded (91%)
1714
1715--------------End Summary --------------
1716-----------------------------------------
1717##################################################################################################################################
1718----- boys4ever.info -----
1719
1720
1721Host's addresses:
1722__________________
1723
1724boys4ever.info. 2641 IN A 170.178.168.203
1725
1726
1727Wildcard detection using: kifjctrznxpv
1728_______________________________________
1729
1730kifjctrznxpv.boys4ever.info. 3600 IN A 70.32.1.32
1731
1732
1733!!!!!!!!!!!!!!!!!!!!!!!!!!!!
1734
1735 Wildcards detected, all subdomains will point to the same IP address
1736 Omitting results containing 70.32.1.32.
1737 Maybe you are using OpenDNS servers.
1738
1739!!!!!!!!!!!!!!!!!!!!!!!!!!!!
1740
1741
1742Name Servers:
1743______________
1744
1745ns16.above.com. 86106 IN A 103.224.212.6
1746ns16.above.com. 86106 IN A 103.224.182.6
1747ns15.above.com. 86106 IN A 103.224.182.5
1748ns15.above.com. 86106 IN A 103.224.212.5
1749
1750
1751Mail (MX) Servers:
1752___________________
1753
1754park-mx.above.com. 389 IN A 103.224.212.34
1755
1756
1757Trying Zone Transfers and getting Bind Versions:
1758_________________________________________________
1759
1760
1761Trying Zone Transfer for boys4ever.info on ns16.above.com ...
1762AXFR record query failed: NOTAUTH
1763
1764Trying Zone Transfer for boys4ever.info on ns15.above.com ...
1765AXFR record query failed: NOTAUTH
1766
1767
1768Scraping boys4ever.info subdomains from Google:
1769________________________________________________
1770
1771
1772 ---- Google search page: 1 ----
1773
1774 ww1
1775 ww25
1776 ww38
1777
1778
1779Google Results:
1780________________
1781
1782ww25.boys4ever.info. 3600 IN CNAME 77026.bodis.com.
178377026.bodis.com. 9539 IN A 199.59.242.153
1784ww1.boys4ever.info. 3447 IN A 91.195.240.46
1785ww38.boys4ever.info. 3600 IN CNAME 701602.parkingcrew.net.
1786701602.parkingcrew.net. 60 IN A 185.53.179.29
1787
1788
1789Brute forcing with /usr/share/dnsenum/dns.txt:
1790_______________________________________________
1791
17921003.boys4ever.info. 3600 IN A 170.178.168.203
17931025.boys4ever.info. 3600 IN A 170.178.168.203
17941029.boys4ever.info. 3600 IN A 170.178.168.203
17951027.boys4ever.info. 3600 IN A 170.178.168.203
17961044.boys4ever.info. 3600 IN A 170.178.168.203
17971071.boys4ever.info. 3600 IN A 170.178.168.203
17981075.boys4ever.info. 3600 IN A 170.178.168.203
17991082.boys4ever.info. 3600 IN A 170.178.168.203
18001106.boys4ever.info. 3600 IN A 170.178.168.203
180111.boys4ever.info. 3600 IN A 170.178.168.203
18021107.boys4ever.info. 3600 IN A 170.178.168.203
18031116.boys4ever.info. 3600 IN A 170.178.168.203
18041168.boys4ever.info. 3600 IN A 170.178.168.203
18051184.boys4ever.info. 3600 IN A 170.178.168.203
18061203.boys4ever.info. 3600 IN A 170.178.168.203
18071189.boys4ever.info. 3600 IN A 170.178.168.203
1808121.boys4ever.info. 3600 IN A 170.178.168.203
1809131.boys4ever.info. 3600 IN A 170.178.168.203
18101211.boys4ever.info. 3600 IN A 170.178.168.203
1811132.boys4ever.info. 3600 IN A 170.178.168.203
1812134.boys4ever.info. 3600 IN A 170.178.168.203
1813135.boys4ever.info. 3600 IN A 170.178.168.203
1814155.boys4ever.info. 3600 IN A 170.178.168.203
1815198.boys4ever.info. 3600 IN A 170.178.168.203
1816214.boys4ever.info. 3600 IN A 170.178.168.203
1817228.boys4ever.info. 3600 IN A 170.178.168.203
181825.boys4ever.info. 3600 IN A 170.178.168.203
1819265.boys4ever.info. 3600 IN A 170.178.168.203
182027.boys4ever.info. 3600 IN A 170.178.168.203
182130.boys4ever.info. 3600 IN A 170.178.168.203
182229.boys4ever.info. 3600 IN A 170.178.168.203
182333.boys4ever.info. 3600 IN A 170.178.168.203
182437.boys4ever.info. 3600 IN A 170.178.168.203
1825419.boys4ever.info. 3600 IN A 170.178.168.203
1826448.boys4ever.info. 3600 IN A 170.178.168.203
182745.boys4ever.info. 3600 IN A 170.178.168.203
182846.boys4ever.info. 3600 IN A 170.178.168.203
1829475.boys4ever.info. 3600 IN A 170.178.168.203
1830479.boys4ever.info. 3600 IN A 170.178.168.203
1831486.boys4ever.info. 3600 IN A 170.178.168.203
1832491.boys4ever.info. 3600 IN A 170.178.168.203
183351.boys4ever.info. 3600 IN A 170.178.168.203
1834528.boys4ever.info. 3600 IN A 170.178.168.203
183554.boys4ever.info. 3600 IN A 170.178.168.203
1836541.boys4ever.info. 3600 IN A 170.178.168.203
1837561.boys4ever.info. 3600 IN A 170.178.168.203
1838598.boys4ever.info. 3600 IN A 170.178.168.203
1839607.boys4ever.info. 3600 IN A 170.178.168.203
1840605.boys4ever.info. 3600 IN A 170.178.168.203
1841616.boys4ever.info. 3600 IN A 170.178.168.203
1842624.boys4ever.info. 3600 IN A 170.178.168.203
1843648.boys4ever.info. 3600 IN A 170.178.168.203
1844669.boys4ever.info. 3600 IN A 170.178.168.203
184567.boys4ever.info. 3600 IN A 170.178.168.203
18467.boys4ever.info. 3600 IN A 170.178.168.203
1847731.boys4ever.info. 3600 IN A 170.178.168.203
1848763.boys4ever.info. 3600 IN A 170.178.168.203
1849805.boys4ever.info. 3600 IN A 170.178.168.203
1850859.boys4ever.info. 3600 IN A 170.178.168.203
1851861.boys4ever.info. 3600 IN A 170.178.168.203
1852948.boys4ever.info. 3600 IN A 170.178.168.203
1853951.boys4ever.info. 3600 IN A 170.178.168.203
1854958.boys4ever.info. 3600 IN A 170.178.168.203
185596.boys4ever.info. 3600 IN A 170.178.168.203
185697.boys4ever.info. 3600 IN A 170.178.168.203
1857976.boys4ever.info. 3600 IN A 170.178.168.203
185899.boys4ever.info. 3600 IN A 170.178.168.203
1859980.boys4ever.info. 3600 IN A 170.178.168.203
1860977.boys4ever.info. 3600 IN A 170.178.168.203
1861996.boys4ever.info. 3600 IN A 170.178.168.203
1862999.boys4ever.info. 3600 IN A 170.178.168.203
1863RKW-ONAFTS-TEST.boys4ever.info. 3600 IN A 170.178.168.203
1864_sip.boys4ever.info. 3600 IN A 170.178.168.203
1865_spf.boys4ever.info. 3600 IN A 170.178.168.203
1866_tls.boys4ever.info. 3600 IN A 170.178.168.203
1867about.boys4ever.info. 3600 IN A 170.178.168.203
1868accept-kbo-bce-wi.boys4ever.info. 3600 IN A 170.178.168.203
1869admin.boys4ever.info. 3046 IN A 170.178.168.203
1870adminer.boys4ever.info. 3600 IN A 170.178.168.203
1871administrator.boys4ever.info. 3388 IN A 170.178.168.203
1872adserver.boys4ever.info. 3388 IN A 170.178.168.203
1873adsl.boys4ever.info. 3600 IN A 170.178.168.203
1874afa.boys4ever.info. 3600 IN A 170.178.168.203
1875affaires-etrangeres.boys4ever.info. 3600 IN A 170.178.168.203
1876affaires-sociales.boys4ever.info. 3600 IN A 170.178.168.203
1877affairesetrangeres.boys4ever.info. 3600 IN A 170.178.168.203
1878afnorth.boys4ever.info. 3600 IN A 170.178.168.203
1879afsca.boys4ever.info. 3600 IN A 170.178.168.203
1880afsca2006.boys4ever.info. 3600 IN A 170.178.168.203
1881agent.boys4ever.info. 3600 IN A 170.178.168.203
1882aiiz.boys4ever.info. 3600 IN A 170.178.168.203
1883aigpol.boys4ever.info. 3600 IN A 170.178.168.203
1884aircraft.boys4ever.info. 3600 IN A 170.178.168.203
1885air.boys4ever.info. 3600 IN A 170.178.168.203
1886airiz.boys4ever.info. 3600 IN A 170.178.168.203
1887airtest.boys4ever.info. 3600 IN A 170.178.168.203
1888albert-II.boys4ever.info. 3600 IN A 170.178.168.203
1889albert-twee.boys4ever.info. 3600 IN A 170.178.168.203
1890alberttwee.boys4ever.info. 3600 IN A 170.178.168.203
1891albertii.boys4ever.info. 3600 IN A 170.178.168.203
1892albertdeux.boys4ever.info. 3600 IN A 170.178.168.203
1893allocationsfamiliales.boys4ever.info. 3600 IN A 170.178.168.203
1894ambtenarenzaken.boys4ever.info. 3600 IN A 170.178.168.203
1895animal-diseases.boys4ever.info. 3600 IN A 170.178.168.203
1896antartica.boys4ever.info. 3600 IN A 170.178.168.203
1897ap.boys4ever.info. 3600 IN A 170.178.168.203
1898aoss.boys4ever.info. 3600 IN A 170.178.168.203
1899arbeid.boys4ever.info. 3600 IN A 170.178.168.203
1900archive.boys4ever.info. 3382 IN A 170.178.168.203
1901asc.boys4ever.info. 3600 IN A 170.178.168.203
1902asia.boys4ever.info. 3600 IN A 170.178.168.203
1903attest-acc.boys4ever.info. 3600 IN A 170.178.168.203
1904av.boys4ever.info. 3381 IN A 170.178.168.203
1905auditinternetresorerie.boys4ever.info. 3600 IN A 170.178.168.203
1906australia.boys4ever.info. 3600 IN A 170.178.168.203
1907bacillusanthracis.boys4ever.info. 3600 IN A 170.178.168.203
1908b-servers.boys4ever.info. 3600 IN A 170.178.168.203
1909backup.boys4ever.info. 3381 IN A 170.178.168.203
1910bc1.boys4ever.info. 3600 IN A 170.178.168.203
1911bce.boys4ever.info. 3600 IN A 170.178.168.203
1912bcss.boys4ever.info. 3600 IN A 170.178.168.203
1913bdsrvns01.boys4ever.info. 3600 IN A 170.178.168.203
1914be.boys4ever.info. 3600 IN A 170.178.168.203
1915belgacom.boys4ever.info. 3600 IN A 170.178.168.203
1916belgie.boys4ever.info. 3600 IN A 170.178.168.203
1917belgique.boys4ever.info. 3600 IN A 170.178.168.203
1918belgoeurop.boys4ever.info. 3600 IN A 170.178.168.203
1919belgopocket.boys4ever.info. 3600 IN A 170.178.168.203
1920belmed-acc.boys4ever.info. 3600 IN A 170.178.168.203
1921beschaeftigung.boys4ever.info. 3600 IN A 170.178.168.203
1922bihdr.boys4ever.info. 3600 IN A 170.178.168.203
1923bfab.boys4ever.info. 3600 IN A 170.178.168.203
1924binnenland.boys4ever.info. 3600 IN A 170.178.168.203
1925binnenlandsezaken.boys4ever.info. 3600 IN A 170.178.168.203
1926birb.boys4ever.info. 3600 IN A 170.178.168.203
1927border1.boys4ever.info. 3600 IN A 170.178.168.203
1928boot-servers.boys4ever.info. 3600 IN A 170.178.168.203
1929brite.boys4ever.info. 3600 IN A 170.178.168.203
1930bse.boys4ever.info. 3600 IN A 170.178.168.203
1931budget.boys4ever.info. 3600 IN A 170.178.168.203
1932budget-federal.boys4ever.info. 3600 IN A 170.178.168.203
1933budgetenbeheerscontrole.boys4ever.info. 3600 IN A 170.178.168.203
1934bugs.boys4ever.info. 3376 IN A 170.178.168.203
1935buildingsagency.boys4ever.info. 3600 IN A 170.178.168.203
1936buitenlandsezaken.boys4ever.info. 3600 IN A 170.178.168.203
1937caami-hziv.boys4ever.info. 3600 IN A 170.178.168.203
1938cadps-login.boys4ever.info. 3600 IN A 170.178.168.203
1939cadps-nt.boys4ever.info. 3600 IN A 170.178.168.203
1940caoc-find.boys4ever.info. 3600 IN A 170.178.168.203
1941caoc1.boys4ever.info. 3600 IN A 170.178.168.203
1942caoc5.boys4ever.info. 3600 IN A 170.178.168.203
1943caoc8.boys4ever.info. 3600 IN A 170.178.168.203
1944caocf.boys4ever.info. 3600 IN A 170.178.168.203
1945caocbalk.boys4ever.info. 3600 IN A 170.178.168.203
1946capac.boys4ever.info. 3600 IN A 170.178.168.203
1947capac-hvw.boys4ever.info. 3600 IN A 170.178.168.203
1948captest.boys4ever.info. 3600 IN A 170.178.168.203
1949ccdd.boys4ever.info. 3600 IN A 170.178.168.203
1950ccdd-ccdv.boys4ever.info. 3600 IN A 170.178.168.203
1951ccdv.boys4ever.info. 3600 IN A 170.178.168.203
1952cdvupensioenen.boys4ever.info. 3600 IN A 170.178.168.203
1953centredexpertise.boys4ever.info. 3600 IN A 170.178.168.203
1954census2011.boys4ever.info. 3600 IN A 170.178.168.203
1955cerva.boys4ever.info. 3600 IN A 170.178.168.203
1956cfdd.boys4ever.info. 3600 IN A 170.178.168.203
1957cfdd-frdo.boys4ever.info. 3600 IN A 170.178.168.203
1958cgs4.boys4ever.info. 3600 IN A 170.178.168.203
1959cgs5.boys4ever.info. 3600 IN A 170.178.168.203
1960cidd.boys4ever.info. 3600 IN A 170.178.168.203
1961cipal.boys4ever.info. 3600 IN A 170.178.168.203
1962cisgr.boys4ever.info. 3600 IN A 170.178.168.203
1963cisteam1.boys4ever.info. 3600 IN A 170.178.168.203
1964citrix.boys4ever.info. 3372 IN A 170.178.168.203
1965classical-swine-fever.boys4ever.info. 3600 IN A 170.178.168.203
1966claude.boys4ever.info. 3600 IN A 170.178.168.203
1967cld.boys4ever.info. 3600 IN A 170.178.168.203
1968clubofvenice.boys4ever.info. 3600 IN A 170.178.168.203
1969cmlag.boys4ever.info. 3600 IN A 170.178.168.203
1970cmn-bw-bru.boys4ever.info. 3600 IN A 170.178.168.203
1971codacerva.boys4ever.info. 3600 IN A 170.178.168.203
1972coda.boys4ever.info. 3600 IN A 170.178.168.203
1973coedat.boys4ever.info. 3600 IN A 170.178.168.203
1974combuysse.boys4ever.info. 3600 IN A 170.178.168.203
1975cominformatics.boys4ever.info. 3600 IN A 170.178.168.203
1976commerce-exterieur.boys4ever.info. 3600 IN A 170.178.168.203
1977commerceexterieur.boys4ever.info. 3600 IN A 170.178.168.203
1978commissionjeuxhasard.boys4ever.info. 3600 IN A 170.178.168.203
1979conformity.boys4ever.info. 3600 IN A 170.178.168.203
1980conseil-etat.boys4ever.info. 3600 IN A 170.178.168.203
1981consetat.boys4ever.info. 3600 IN A 170.178.168.203
1982conventionue.boys4ever.info. 3600 IN A 170.178.168.203
1983conseildetat.boys4ever.info. 3600 IN A 170.178.168.203
1984conventioneu.boys4ever.info. 3600 IN A 170.178.168.203
1985copieconforme.boys4ever.info. 3600 IN A 170.178.168.203
1986cpas.boys4ever.info. 3600 IN A 170.178.168.203
1987cprr.boys4ever.info. 3600 IN A 170.178.168.203
1988csl-uncl-pdc.boys4ever.info. 3600 IN A 170.178.168.203
1989ctc.boys4ever.info. 3600 IN A 170.178.168.203
1990cvts.boys4ever.info. 3600 IN A 170.178.168.203
1991davo.boys4ever.info. 3600 IN A 170.178.168.203
1992deambachten.boys4ever.info. 3600 IN A 170.178.168.203
1993deambachten-acc.boys4ever.info. 3600 IN A 170.178.168.203
1994developpement.boys4ever.info. 3600 IN A 170.178.168.203
1995di.boys4ever.info. 3600 IN A 170.178.168.203
1996diehandwerker.boys4ever.info. 3600 IN A 170.178.168.203
1997diehandwerker-acc.boys4ever.info. 3600 IN A 170.178.168.203
1998diplomatie.boys4ever.info. 3600 IN A 170.178.168.203
1999dioxine.boys4ever.info. 3600 IN A 170.178.168.203
2000dioxines.boys4ever.info. 3600 IN A 170.178.168.203
2001diplobel.boys4ever.info. 3600 IN A 170.178.168.203
2002dmz.boys4ever.info. 3368 IN A 170.178.168.203
2003dmz-2.boys4ever.info. 3600 IN A 170.178.168.203
2004dns1.boys4ever.info. 3368 IN A 170.178.168.203
2005dns2.boys4ever.info. 3368 IN A 170.178.168.203
2006dns0.boys4ever.info. 3600 IN A 170.178.168.203
2007dns1w.boys4ever.info. 3600 IN A 170.178.168.203
2008dns3.boys4ever.info. 3368 IN A 170.178.168.203
2009docufin.boys4ever.info. 3600 IN A 170.178.168.203
2010dnsinterb.boys4ever.info. 3600 IN A 170.178.168.203
2011doot-servers.boys4ever.info. 3600 IN A 170.178.168.203
2012dosz-ossom.boys4ever.info. 3600 IN A 170.178.168.203
2013e2e.boys4ever.info. 3600 IN A 170.178.168.203
2014ebr.boys4ever.info. 3600 IN A 170.178.168.203
2015ebr-acc.boys4ever.info. 3600 IN A 170.178.168.203
2016ecolabel.boys4ever.info. 3600 IN A 170.178.168.203
2017economie2.boys4ever.info. 3600 IN A 170.178.168.203
2018economiesociale.boys4ever.info. 3600 IN A 170.178.168.203
2019ed-dau.boys4ever.info. 3600 IN A 170.178.168.203
2020edatenq-acc.boys4ever.info. 3600 IN A 170.178.168.203
2021eddau.boys4ever.info. 3600 IN A 170.178.168.203
2022ehealth.boys4ever.info. 3600 IN A 170.178.168.203
2023eisz.boys4ever.info. 3600 IN A 170.178.168.203
2024eiz7iu9g.boys4ever.info. 3600 IN A 170.178.168.203
2025eiss.boys4ever.info. 3600 IN A 170.178.168.203
2026election.boys4ever.info. 3600 IN A 170.178.168.203
2027electionresults.boys4ever.info. 3600 IN A 170.178.168.203
2028electionssociales.boys4ever.info. 3600 IN A 170.178.168.203
2029emc.boys4ever.info. 3600 IN A 170.178.168.203
2030emploi.boys4ever.info. 3600 IN A 170.178.168.203
2031employment.boys4ever.info. 3600 IN A 170.178.168.203
2032eng-tx.boys4ever.info. 3600 IN A 170.178.168.203
2033energie.boys4ever.info. 3600 IN A 170.178.168.203
2034engtx2.boys4ever.info. 3600 IN A 170.178.168.203
2035eoot-servers.boys4ever.info. 3600 IN A 170.178.168.203
2036environment.boys4ever.info. 3600 IN A 170.178.168.203
2037eranova.boys4ever.info. 3600 IN A 170.178.168.203
2038erhebung.boys4ever.info. 3600 IN A 170.178.168.203
2039euconvention.boys4ever.info. 3600 IN A 170.178.168.203
2040euconventie.boys4ever.info. 3600 IN A 170.178.168.203
2041eudir.boys4ever.info. 3600 IN A 170.178.168.203
2042exctest.boys4ever.info. 3600 IN A 170.178.168.203
2043extern.boys4ever.info. 3600 IN A 170.178.168.203
2044fanc2.boys4ever.info. 3600 IN A 170.178.168.203
2045faofat.boys4ever.info. 3600 IN A 170.178.168.203
2046fatfao.boys4ever.info. 3600 IN A 170.178.168.203
2047favv-afsca.boys4ever.info. 3600 IN A 170.178.168.203
2048fbk.boys4ever.info. 3600 IN A 170.178.168.203
2049fbz.boys4ever.info. 3600 IN A 170.178.168.203
2050fchd.boys4ever.info. 3600 IN A 170.178.168.203
2051fcmd.boys4ever.info. 3600 IN A 170.178.168.203
2052fedasil.boys4ever.info. 3600 IN A 170.178.168.203
2053fedasilantartica.boys4ever.info. 3600 IN A 170.178.168.203
2054fernandez.boys4ever.info. 3600 IN A 170.178.168.203
2055fin.boys4ever.info. 3600 IN A 170.178.168.203
2056ffe.boys4ever.info. 3600 IN A 170.178.168.203
2057finanzen.boys4ever.info. 3600 IN A 170.178.168.203
2058finderup.boys4ever.info. 3600 IN A 170.178.168.203
2059fisconet.boys4ever.info. 3600 IN A 170.178.168.203
2060fmp.boys4ever.info. 3600 IN A 170.178.168.203
2061flr-stat.boys4ever.info. 3600 IN A 170.178.168.203
2062fmp-fbz.boys4ever.info. 3600 IN A 170.178.168.203
2063fonction-publique.boys4ever.info. 3600 IN A 170.178.168.203
2064fonctionnaires.boys4ever.info. 3600 IN A 170.178.168.203
2065fondsspecialdeprotection.boys4ever.info. 3600 IN A 170.178.168.203
2066foodsafety.boys4ever.info. 3600 IN A 170.178.168.203
2067forensics.boys4ever.info. 3600 IN A 170.178.168.203
2068fortar3.boys4ever.info. 3600 IN A 170.178.168.203
2069form.boys4ever.info. 3600 IN A 170.178.168.203
2070fortar3-acc.boys4ever.info. 3600 IN A 170.178.168.203
2071forums.boys4ever.info. 3355 IN A 170.178.168.203
2072fr.boys4ever.info. 3355 IN A 170.178.168.203
2073fra.boys4ever.info. 3600 IN A 170.178.168.203
2074frdo-cfdd.boys4ever.info. 3600 IN A 170.178.168.203
2075fso.boys4ever.info. 3600 IN A 170.178.168.203
2076ftps.boys4ever.info. 3600 IN A 170.178.168.203
2077fytoweb.boys4ever.info. 3600 IN A 170.178.168.203
2078g.boys4ever.info. 3354 IN A 170.178.168.203
2079gamingcommission.boys4ever.info. 3600 IN A 170.178.168.203
2080gas2020gaz.boys4ever.info. 3600 IN A 170.178.168.203
2081galahad.boys4ever.info. 3600 IN A 170.178.168.203
2082ge-nl.boys4ever.info. 3600 IN A 170.178.168.203
2083gehaelter.boys4ever.info. 3600 IN A 170.178.168.203
2084gemsz.boys4ever.info. 3600 IN A 170.178.168.203
2085genootschap.boys4ever.info. 3600 IN A 170.178.168.203
2086gesundheit.boys4ever.info. 3600 IN A 170.178.168.203
2087gfmd-fmmd.boys4ever.info. 3600 IN A 170.178.168.203
2088gr.boys4ever.info. 3600 IN A 170.178.168.203
2089grc.boys4ever.info. 3600 IN A 170.178.168.203
2090griep.boys4ever.info. 3600 IN A 170.178.168.203
2091grippe.boys4ever.info. 3600 IN A 170.178.168.203
2092guideweb.boys4ever.info. 3600 IN A 170.178.168.203
2093gwydion.boys4ever.info. 3600 IN A 170.178.168.203
2094handicap.boys4ever.info. 3600 IN A 170.178.168.203
2095hkiv.boys4ever.info. 3600 IN A 170.178.168.203
2096hfa.boys4ever.info. 3600 IN A 170.178.168.203
2097hms.boys4ever.info. 3600 IN A 170.178.168.203
2098hog-cholera.boys4ever.info. 3600 IN A 170.178.168.203
2099hogcholera.boys4ever.info. 3600 IN A 170.178.168.203
2100hoot-servers.boys4ever.info. 3600 IN A 170.178.168.203
2101hrf.boys4ever.info. 3600 IN A 170.178.168.203
2102hq.boys4ever.info. 3600 IN A 170.178.168.203
2103hrf-mobile.boys4ever.info. 3600 IN A 170.178.168.203
2104https.boys4ever.info. 3600 IN A 170.178.168.203
2105hrfl.boys4ever.info. 3600 IN A 170.178.168.203
2106hvkz-cspm.boys4ever.info. 3600 IN A 170.178.168.203
2107hvw.boys4ever.info. 3600 IN A 170.178.168.203
2108hvkz.boys4ever.info. 3600 IN A 170.178.168.203
2109hvw-capac.boys4ever.info. 3600 IN A 170.178.168.203
2110ibz.boys4ever.info. 3600 IN A 170.178.168.203
2111ichr.boys4ever.info. 3600 IN A 170.178.168.203
2112ibzdgip.boys4ever.info. 3600 IN A 170.178.168.203
2113icn-inr.boys4ever.info. 3600 IN A 170.178.168.203
2114ict-ssl.boys4ever.info. 3600 IN A 170.178.168.203
2115ictctest.boys4ever.info. 3600 IN A 170.178.168.203
2116ida.boys4ever.info. 3600 IN A 170.178.168.203
2117idav.boys4ever.info. 3600 IN A 170.178.168.203
2118iefa.boys4ever.info. 3600 IN A 170.178.168.203
2119iefh.boys4ever.info. 3600 IN A 170.178.168.203
2120iev-ivk.boys4ever.info. 3600 IN A 170.178.168.203
2121ies.boys4ever.info. 3600 IN A 170.178.168.203
2122iev.boys4ever.info. 3600 IN A 170.178.168.203
2123ifa-ofo.boys4ever.info. 3600 IN A 170.178.168.203
2124ifaofo.boys4ever.info. 3600 IN A 170.178.168.203
2125imcd1.boys4ever.info. 3600 IN A 170.178.168.203
2126imcd2.boys4ever.info. 3600 IN A 170.178.168.203
2127imcd3.boys4ever.info. 3600 IN A 170.178.168.203
2128inami-riziv.boys4ever.info. 3600 IN A 170.178.168.203
2129inasti.boys4ever.info. 3600 IN A 170.178.168.203
2130ine.boys4ever.info. 3600 IN A 170.178.168.203
2131inr-icn.boys4ever.info. 3600 IN A 170.178.168.203
2132inrct.boys4ever.info. 3600 IN A 170.178.168.203
2133interieur.boys4ever.info. 3600 IN A 170.178.168.203
2134intern.boys4ever.info. 3600 IN A 170.178.168.203
2135inspectiondesfinances.boys4ever.info. 3600 IN A 170.178.168.203
2136interneauditthesaurie.boys4ever.info. 3600 IN A 170.178.168.203
2137ioot-servers.boys4ever.info. 3600 IN A 170.178.168.203
2138ipcbel130.boys4ever.info. 3600 IN A 170.178.168.203
2139irc.boys4ever.info. 3346 IN A 170.178.168.203
2140iroigwy.boys4ever.info. 3600 IN A 170.178.168.203
2141isaf-hq.boys4ever.info. 3600 IN A 170.178.168.203
2142it.boys4ever.info. 3345 IN A 170.178.168.203
2143issue-tracker.boys4ever.info. 3600 IN A 170.178.168.203
2144iv-inig.boys4ever.info. 3600 IN A 170.178.168.203
2145ivkiev.boys4ever.info. 3600 IN A 170.178.168.203
2146jcsc.boys4ever.info. 3600 IN A 170.178.168.203
2147jcse.boys4ever.info. 3600 IN A 170.178.168.203
2148jcsw.boys4ever.info. 3600 IN A 170.178.168.203
2149jenner.boys4ever.info. 3600 IN A 170.178.168.203
2150jfcnaples.boys4ever.info. 3600 IN A 170.178.168.203
2151jfcbs.boys4ever.info. 3600 IN A 170.178.168.203
2152jfcnp.boys4ever.info. 3600 IN A 170.178.168.203
2153jfnp.boys4ever.info. 3600 IN A 170.178.168.203
2154jhnsgda.boys4ever.info. 3600 IN A 170.178.168.203
2155jobs.boys4ever.info. 2991 IN A 170.178.168.203
2156joot-servers.boys4ever.info. 3600 IN A 170.178.168.203
2157jurion.boys4ever.info. 3600 IN A 170.178.168.203
2158justitie.boys4ever.info. 3600 IN A 170.178.168.203
2159justine.boys4ever.info. 3600 IN A 170.178.168.203
2160jwc.boys4ever.info. 3600 IN A 170.178.168.203
2161kbo-bce-wi.boys4ever.info. 3600 IN A 170.178.168.203
2162kbo-test.boys4ever.info. 3600 IN A 170.178.168.203
2163kbopub-acc.boys4ever.info. 3600 IN A 170.178.168.203
2164kbopub.boys4ever.info. 3600 IN A 170.178.168.203
2165kce2.boys4ever.info. 3600 IN A 170.178.168.203
2166kcetools.boys4ever.info. 3600 IN A 170.178.168.203
2167kim.boys4ever.info. 3600 IN A 170.178.168.203
2168klassieke-varkenspest.boys4ever.info. 3600 IN A 170.178.168.203
2169klassiekevarkenspest.boys4ever.info. 3600 IN A 170.178.168.203
2170kleinkasteeltje.boys4ever.info. 3600 IN A 170.178.168.203
2171konings-palast.boys4ever.info. 3600 IN A 170.178.168.203
2172koningspalast.boys4ever.info. 3600 IN A 170.178.168.203
2173kruispuntbank.boys4ever.info. 3600 IN A 170.178.168.203
2174lab.boys4ever.info. 3338 IN A 170.178.168.203
2175ksz.boys4ever.info. 3600 IN A 170.178.168.203
2176lahd2.boys4ever.info. 3600 IN A 170.178.168.203
2177laruelle.boys4ever.info. 3600 IN A 170.178.168.203
2178lancelot.boys4ever.info. 3600 IN A 170.178.168.203
2179lauretteonkelinx.boys4ever.info. 3600 IN A 170.178.168.203
2180leefmilieu.boys4ever.info. 3600 IN A 170.178.168.203
2181linux.boys4ever.info. 3337 IN A 170.178.168.203
2182lesartisans-acc.boys4ever.info. 3600 IN A 170.178.168.203
2183linpha.boys4ever.info. 3600 IN A 170.178.168.203
2184limosa.boys4ever.info. 3600 IN A 170.178.168.203
2185lists.boys4ever.info. 3336 IN A 170.178.168.203
2186live.boys4ever.info. 2983 IN A 170.178.168.203
2187live2.boys4ever.info. 3600 IN A 170.178.168.203
2188lnc03.boys4ever.info. 3600 IN A 170.178.168.203
2189lnc09.boys4ever.info. 3600 IN A 170.178.168.203
2190lnc15.boys4ever.info. 3600 IN A 170.178.168.203
2191lnc13.boys4ever.info. 3600 IN A 170.178.168.203
2192lnc16.boys4ever.info. 3600 IN A 170.178.168.203
2193log.boys4ever.info. 3335 IN A 170.178.168.203
2194lo.boys4ever.info. 3600 IN A 170.178.168.203
2195logos.boys4ever.info. 3600 IN A 170.178.168.203
2196lokalpolizei.boys4ever.info. 3600 IN A 170.178.168.203
2197loot-servers.boys4ever.info. 3600 IN A 170.178.168.203
2198lss.boys4ever.info. 3600 IN A 170.178.168.203
2199madeliefjes.boys4ever.info. 3600 IN A 170.178.168.203
2200lssplv.boys4ever.info. 3600 IN A 170.178.168.203
2201mail.boys4ever.info. 2982 IN A 170.178.168.203
2202mail2.boys4ever.info. 2982 IN A 170.178.168.203
2203mainguard.boys4ever.info. 3600 IN A 170.178.168.203
2204maladies-animales.boys4ever.info. 3600 IN A 170.178.168.203
2205maladies-professionnelles.boys4ever.info. 3600 IN A 170.178.168.203
2206maladiesanimales.boys4ever.info. 3600 IN A 170.178.168.203
2207margrietjes.boys4ever.info. 3600 IN A 170.178.168.203
2208margueritebelge.boys4ever.info. 3600 IN A 170.178.168.203
2209mas.boys4ever.info. 3600 IN A 170.178.168.203
2210masecu.boys4ever.info. 3600 IN A 170.178.168.203
2211maxima.boys4ever.info. 3600 IN A 170.178.168.203
2212mazfp.boys4ever.info. 3600 IN A 170.178.168.203
2213me262.boys4ever.info. 3600 IN A 170.178.168.203
2214mediateurpensions.boys4ever.info. 3600 IN A 170.178.168.203
2215mediateur-pensions.boys4ever.info. 3600 IN A 170.178.168.203
2216members.boys4ever.info. 3334 IN A 170.178.168.203
2217member.boys4ever.info. 3334 IN A 170.178.168.203
2218mediationpensions.boys4ever.info. 3600 IN A 170.178.168.203
2219meta.boys4ever.info. 3334 IN A 170.178.168.203
2220metrologie.boys4ever.info. 3600 IN A 170.178.168.203
2221minfin.boys4ever.info. 3600 IN A 170.178.168.203
2222mim.boys4ever.info. 3600 IN A 170.178.168.203
2223mistr.boys4ever.info. 3600 IN A 170.178.168.203
2224mlink1.boys4ever.info. 3600 IN A 170.178.168.203
2225mittelstand.boys4ever.info. 3600 IN A 170.178.168.203
2226mlink2.boys4ever.info. 3600 IN A 170.178.168.203
2227mobilitatswoche.boys4ever.info. 3600 IN A 170.178.168.203
2228monarchie.boys4ever.info. 3600 IN A 170.178.168.203
2229monarchy.boys4ever.info. 3600 IN A 170.178.168.203
2230monit.boys4ever.info. 3600 IN A 170.178.168.203
2231mtwg.boys4ever.info. 3600 IN A 170.178.168.203
2232mx11.boys4ever.info. 3600 IN A 170.178.168.203
2233mx2.boys4ever.info. 2976 IN A 170.178.168.203
2234mx12.boys4ever.info. 3600 IN A 170.178.168.203
2235mykce.boys4ever.info. 3600 IN A 170.178.168.203
2236nacma.boys4ever.info. 3600 IN A 170.178.168.203
2237naewfc.boys4ever.info. 3600 IN A 170.178.168.203
2238nagsma.boys4ever.info. 3600 IN A 170.178.168.203
2239naissance2.boys4ever.info. 3600 IN A 170.178.168.203
2240naissance.boys4ever.info. 3600 IN A 170.178.168.203
2241nahema.boys4ever.info. 3600 IN A 170.178.168.203
2242naples.boys4ever.info. 3600 IN A 170.178.168.203
2243namsa.boys4ever.info. 3600 IN A 170.178.168.203
2244namsacell-npc.boys4ever.info. 3600 IN A 170.178.168.203
2245napma.boys4ever.info. 3600 IN A 170.178.168.203
2246nationalregister.boys4ever.info. 3600 IN A 170.178.168.203
2247nav.boys4ever.info. 3600 IN A 170.178.168.203
2248navtest.boys4ever.info. 3600 IN A 170.178.168.203
2249natoschool.boys4ever.info. 3600 IN A 170.178.168.203
2250nc1s.boys4ever.info. 3600 IN A 170.178.168.203
2251nciss.boys4ever.info. 3600 IN A 170.178.168.203
2252ncirc.boys4ever.info. 3600 IN A 170.178.168.203
2253nciz.boys4ever.info. 3600 IN A 170.178.168.203
2254ncmd.boys4ever.info. 3600 IN A 170.178.168.203
2255ncnp-dpr.boys4ever.info. 3600 IN A 170.178.168.203
2256ncnw.boys4ever.info. 3600 IN A 170.178.168.203
2257net.boys4ever.info. 3328 IN A 170.178.168.203
2258ndc.boys4ever.info. 3600 IN A 170.178.168.203
2259ndss.boys4ever.info. 3600 IN A 170.178.168.203
2260nehap.boys4ever.info. 3600 IN A 170.178.168.203
2261netma.boys4ever.info. 3600 IN A 170.178.168.203
2262news.boys4ever.info. 2973 IN A 170.178.168.203
2263ng3.boys4ever.info. 3600 IN A 170.178.168.203
2264nhqc3s.boys4ever.info. 3600 IN A 170.178.168.203
2265nhqb-mail.boys4ever.info. 3600 IN A 170.178.168.203
2266nic.boys4ever.info. 3600 IN A 170.178.168.203
2267nihdi.boys4ever.info. 3600 IN A 170.178.168.203
2268niooo.boys4ever.info. 3600 IN A 170.178.168.203
2269nima.boys4ever.info. 3600 IN A 170.178.168.203
2270nitcdsa.boys4ever.info. 3600 IN A 170.178.168.203
2271nl.boys4ever.info. 3326 IN A 170.178.168.203
2272nitcpki.boys4ever.info. 3600 IN A 170.178.168.203
2273nmiotc.boys4ever.info. 3600 IN A 170.178.168.203
2274nlctst.boys4ever.info. 3600 IN A 170.178.168.203
2275nova.boys4ever.info. 3600 IN A 170.178.168.203
2276nnmc.boys4ever.info. 3600 IN A 170.178.168.203
2277nr.boys4ever.info. 3600 IN A 170.178.168.203
2278ns.boys4ever.info. 3325 IN A 170.178.168.203
2279nra.boys4ever.info. 3600 IN A 170.178.168.203
2280nrflb.boys4ever.info. 3600 IN A 170.178.168.203
2281ns01.boys4ever.info. 3325 IN A 170.178.168.203
2282ns1.boys4ever.info. 2970 IN A 170.178.168.203
2283ns3.boys4ever.info. 2971 IN A 170.178.168.203
2284nsa.boys4ever.info. 3600 IN A 170.178.168.203
2285nshq.boys4ever.info. 3600 IN A 170.178.168.203
2286ntmi-hq.boys4ever.info. 3600 IN A 170.178.168.203
2287nurc.boys4ever.info. 3600 IN A 170.178.168.203
2288ntserver.boys4ever.info. 3600 IN A 170.178.168.203
2289obel.boys4ever.info. 3600 IN A 170.178.168.203
2290ocmw.boys4ever.info. 3600 IN A 170.178.168.203
2291ocde-principesdirecteurs.boys4ever.info. 3600 IN A 170.178.168.203
2292offentlichendienst.boys4ever.info. 3600 IN A 170.178.168.203
2293oeso-richtlijnen.boys4ever.info. 3600 IN A 170.178.168.203
2294offentlichendienstespensionen.boys4ever.info. 3600 IN A 170.178.168.203
2295old.boys4ever.info. 2968 IN A 170.178.168.203
2296ofo-ifa.boys4ever.info. 3600 IN A 170.178.168.203
2297oldphpfarm-stag.boys4ever.info. 3600 IN A 170.178.168.203
2298ombudsdienstpensioenen.boys4ever.info. 3600 IN A 170.178.168.203
2299ombudsdienstpensionen.boys4ever.info. 3600 IN A 170.178.168.203
2300ombudsman.boys4ever.info. 3600 IN A 170.178.168.203
2301ombudsman-pensioen.boys4ever.info. 3600 IN A 170.178.168.203
2302ombudsman-pensionen.boys4ever.info. 3600 IN A 170.178.168.203
2303ombudsman-pensioenen.boys4ever.info. 3600 IN A 170.178.168.203
2304ombudsman-pesion.boys4ever.info. 3600 IN A 170.178.168.203
2305ombudsman-pensions.boys4ever.info. 3600 IN A 170.178.168.203
2306ombudsmann-pensionen.boys4ever.info. 3600 IN A 170.178.168.203
2307ombudsmanpensioen.boys4ever.info. 3600 IN A 170.178.168.203
2308ombudsmanpesion.boys4ever.info. 3600 IN A 170.178.168.203
2309onem-rva.boys4ever.info. 3600 IN A 170.178.168.203
2310onerva.boys4ever.info. 3600 IN A 170.178.168.203
2311onkelinckx.boys4ever.info. 3600 IN A 170.178.168.203
2312onkelinx.boys4ever.info. 3600 IN A 170.178.168.203
2313onp-rvp.boys4ever.info. 3600 IN A 170.178.168.203
2314onprvp.boys4ever.info. 3600 IN A 170.178.168.203
2315onss.boys4ever.info. 3600 IN A 170.178.168.203
2316onssapl.boys4ever.info. 3600 IN A 170.178.168.203
2317ontwikkeling.boys4ever.info. 3600 IN A 170.178.168.203
2318ontwikkelingssamenwerking.boys4ever.info. 3600 IN A 170.178.168.203
2319osone.boys4ever.info. 3600 IN A 170.178.168.203
2320ossom.boys4ever.info. 3600 IN A 170.178.168.203
2321overheidspensioenen.boys4ever.info. 3600 IN A 170.178.168.203
2322outsite.boys4ever.info. 3600 IN A 170.178.168.203
2323owa.boys4ever.info. 3320 IN A 170.178.168.203
2324p-o.boys4ever.info. 3600 IN A 170.178.168.203
2325palais-royal.boys4ever.info. 3600 IN A 170.178.168.203
2326pacific.boys4ever.info. 3600 IN A 170.178.168.203
2327paquerettes.boys4ever.info. 3600 IN A 170.178.168.203
2328patrimoniumdiensten.boys4ever.info. 3600 IN A 170.178.168.203
2329pdod.boys4ever.info. 3600 IN A 170.178.168.203
2330pdoed.boys4ever.info. 3600 IN A 170.178.168.203
2331pensioenagentschap.boys4ever.info. 3600 IN A 170.178.168.203
2332pensioenen.boys4ever.info. 3600 IN A 170.178.168.203
2333pesteaviaire.boys4ever.info. 3600 IN A 170.178.168.203
2334peste-aviaire.boys4ever.info. 3600 IN A 170.178.168.203
2335peste-porcine.boys4ever.info. 3600 IN A 170.178.168.203
2336petrel35.boys4ever.info. 3600 IN A 170.178.168.203
2337phimail.boys4ever.info. 3600 IN A 170.178.168.203
2338phpbalancer.boys4ever.info. 3600 IN A 170.178.168.203
2339phpmyadmin.boys4ever.info. 3318 IN A 170.178.168.203
2340phpbalancer-stag.boys4ever.info. 3600 IN A 170.178.168.203
2341phytoweb.boys4ever.info. 3600 IN A 170.178.168.203
2342plan2004.boys4ever.info. 3600 IN A 170.178.168.203
2343plda.boys4ever.info. 3600 IN A 170.178.168.203
2344po.boys4ever.info. 3600 IN A 170.178.168.203
2345police-locale.boys4ever.info. 3600 IN A 170.178.168.203
2346pop.boys4ever.info. 3316 IN A 170.178.168.203
2347pophost.boys4ever.info. 3600 IN A 170.178.168.203
2348postbus.boys4ever.info. 3600 IN A 170.178.168.203
2349ppp1.boys4ever.info. 3600 IN A 170.178.168.203
2350ppp12.boys4ever.info. 3600 IN A 170.178.168.203
2351ppp13.boys4ever.info. 3600 IN A 170.178.168.203
2352ppp14.boys4ever.info. 3600 IN A 170.178.168.203
2353ppp15.boys4ever.info. 3600 IN A 170.178.168.203
2354ppp17.boys4ever.info. 3600 IN A 170.178.168.203
2355ppp18.boys4ever.info. 3600 IN A 170.178.168.203
2356ppp19.boys4ever.info. 3600 IN A 170.178.168.203
2357ppp20.boys4ever.info. 3600 IN A 170.178.168.203
2358ppp2.boys4ever.info. 3600 IN A 170.178.168.203
2359ppp3.boys4ever.info. 3600 IN A 170.178.168.203
2360ppp9.boys4ever.info. 3600 IN A 170.178.168.203
2361premier.boys4ever.info. 3600 IN A 170.178.168.203
2362pptp.boys4ever.info. 3600 IN A 170.178.168.203
2363pressreview.boys4ever.info. 3600 IN A 170.178.168.203
2364princesseelisabeth.boys4ever.info. 3600 IN A 170.178.168.203
2365princesse-elisabeth.boys4ever.info. 3600 IN A 170.178.168.203
2366prinses-elisabeth.boys4ever.info. 3600 IN A 170.178.168.203
2367printer.boys4ever.info. 3600 IN A 170.178.168.203
2368prinzessin-elisabeth.boys4ever.info. 3600 IN A 170.178.168.203
2369private-sicherheit.boys4ever.info. 3600 IN A 170.178.168.203
2370privatesicherheit.boys4ever.info. 3600 IN A 170.178.168.203
2371prodcom.boys4ever.info. 3600 IN A 170.178.168.203
2372publichealth.boys4ever.info. 3600 IN A 170.178.168.203
2373quetelet.boys4ever.info. 3600 IN A 170.178.168.203
2374raadvanstate.boys4ever.info. 3600 IN A 170.178.168.203
2375raadvst.boys4ever.info. 3600 IN A 170.178.168.203
2376rac-restaurants-cae.boys4ever.info. 3600 IN A 170.178.168.203
2377raadvst-consetat.boys4ever.info. 3600 IN A 170.178.168.203
2378ranva.boys4ever.info. 3600 IN A 170.178.168.203
2379ras.boys4ever.info. 3310 IN A 170.178.168.203
2380rcs.boys4ever.info. 3600 IN A 170.178.168.203
2381rdb-rdg.boys4ever.info. 3600 IN A 170.178.168.203
2382rdg-rdb.boys4ever.info. 3600 IN A 170.178.168.203
2383reach.boys4ever.info. 3600 IN A 170.178.168.203
2384recherche.boys4ever.info. 3600 IN A 170.178.168.203
2385reflex.boys4ever.info. 3600 IN A 170.178.168.203
2386regie.boys4ever.info. 3600 IN A 170.178.168.203
2387register.boys4ever.info. 3308 IN A 170.178.168.203
2388relay.boys4ever.info. 3308 IN A 170.178.168.203
2389reno.boys4ever.info. 3600 IN A 170.178.168.203
2390relay1.boys4ever.info. 3600 IN A 170.178.168.203
2391residencepalace.boys4ever.info. 3600 IN A 170.178.168.203
2392resultatselectoraux.boys4ever.info. 3600 IN A 170.178.168.203
2393revenu-dintegration.boys4ever.info. 3600 IN A 170.178.168.203
2394revenudintegration.boys4ever.info. 3600 IN A 170.178.168.203
2395rfid-test.boys4ever.info. 3600 IN A 170.178.168.203
2396rjv-onva.boys4ever.info. 3600 IN A 170.178.168.203
2397riziv-inami.boys4ever.info. 3600 IN A 170.178.168.203
2398root.boys4ever.info. 3307 IN A 170.178.168.203
2399rrn.boys4ever.info. 3600 IN A 170.178.168.203
2400rssdirectory.boys4ever.info. 3600 IN A 170.178.168.203
2401rsz.boys4ever.info. 3600 IN A 170.178.168.203
2402ruling.boys4ever.info. 3600 IN A 170.178.168.203
2403rva.boys4ever.info. 3600 IN A 170.178.168.203
2404rvp-onp.boys4ever.info. 3600 IN A 170.178.168.203
2405rvponp.boys4ever.info. 3600 IN A 170.178.168.203
2406saml.boys4ever.info. 3600 IN A 170.178.168.203
2407sant01.boys4ever.info. 3600 IN A 170.178.168.203
2408sante.boys4ever.info. 3600 IN A 170.178.168.203
2409sav.boys4ever.info. 3600 IN A 170.178.168.203
2410sbib03.boys4ever.info. 3600 IN A 170.178.168.203
2411scdfpensions.boys4ever.info. 3600 IN A 170.178.168.203
2412sdpsp.boys4ever.info. 3600 IN A 170.178.168.203
2413schweinepest.boys4ever.info. 3600 IN A 170.178.168.203
2414secure2.boys4ever.info. 3600 IN A 170.178.168.203
2415securitealimentaire.boys4ever.info. 3600 IN A 170.178.168.203
2416selor.boys4ever.info. 3600 IN A 170.178.168.203
2417serverex.boys4ever.info. 3600 IN A 170.178.168.203
2418services-stag.boys4ever.info. 3600 IN A 170.178.168.203
2419servicespatrimoniaux.boys4ever.info. 3600 IN A 170.178.168.203
2420servicesdirective.boys4ever.info. 3600 IN A 170.178.168.203
2421seveso.boys4ever.info. 3600 IN A 170.178.168.203
2422sfn.boys4ever.info. 3600 IN A 170.178.168.203
2423shipping.boys4ever.info. 3600 IN A 170.178.168.203
2424shop.boys4ever.info. 3301 IN A 170.178.168.203
2425shopinfo.boys4ever.info. 3600 IN A 170.178.168.203
2426shop-info.boys4ever.info. 3600 IN A 170.178.168.203
2427sibelius.boys4ever.info. 3600 IN A 170.178.168.203
2428siem.boys4ever.info. 2940 IN A 170.178.168.203
2429sigedis.boys4ever.info. 3600 IN A 170.178.168.203
2430silberfonds.boys4ever.info. 3600 IN A 170.178.168.203
2431sist.boys4ever.info. 3600 IN A 170.178.168.203
2432sirs.boys4ever.info. 3600 IN A 170.178.168.203
2433slgs01.boys4ever.info. 3600 IN A 170.178.168.203
2434smtp.boys4ever.info. 3300 IN A 170.178.168.203
2435sng302.boys4ever.info. 3600 IN A 170.178.168.203
2436sng3lnmail1.boys4ever.info. 3600 IN A 170.178.168.203
2437sng3lnmail2.boys4ever.info. 3600 IN A 170.178.168.203
2438sngslnmail1.boys4ever.info. 3600 IN A 170.178.168.203
2439snislnmail2.boys4ever.info. 3600 IN A 170.178.168.203
2440snislnmail3.boys4ever.info. 3600 IN A 170.178.168.203
2441snmp.boys4ever.info. 2938 IN A 170.178.168.203
2442sobane.boys4ever.info. 3600 IN A 170.178.168.203
2443sociaaltarief.boys4ever.info. 3600 IN A 170.178.168.203
2444socialeconomy.boys4ever.info. 3600 IN A 170.178.168.203
2445socialeeconomie.boys4ever.info. 3600 IN A 170.178.168.203
2446socialeverkiezingen.boys4ever.info. 3600 IN A 170.178.168.203
2447socialsecurity.boys4ever.info. 3600 IN A 170.178.168.203
2448soctar.boys4ever.info. 3600 IN A 170.178.168.203
2449sof.boys4ever.info. 3600 IN A 170.178.168.203
2450sp.boys4ever.info. 3295 IN A 170.178.168.203
2451sql3.boys4ever.info. 3600 IN A 170.178.168.203
2452sql2.boys4ever.info. 3600 IN A 170.178.168.203
2453sql1.boys4ever.info. 3600 IN A 170.178.168.203
2454ssc.boys4ever.info. 3600 IN A 170.178.168.203
2455ssh.boys4ever.info. 3295 IN A 170.178.168.203
2456starfighter.boys4ever.info. 3600 IN A 170.178.168.203
2457stats.boys4ever.info. 3296 IN A 170.178.168.203
2458studentatwork.boys4ever.info. 3600 IN A 170.178.168.203
2459studentaanhetwerk.boys4ever.info. 3600 IN A 170.178.168.203
2460suche.boys4ever.info. 3600 IN A 170.178.168.203
2461survey.boys4ever.info. 3296 IN A 170.178.168.203
2462syslog.boys4ever.info. 2933 IN A 170.178.168.203
2463sw.boys4ever.info. 3600 IN A 170.178.168.203
2464swtc02.boys4ever.info. 3600 IN A 170.178.168.203
2465ta.boys4ever.info. 3600 IN A 170.178.168.203
2466taccp.boys4ever.info. 3600 IN A 170.178.168.203
2467tarifsocial-acc.boys4ever.info. 3600 IN A 170.178.168.203
2468tax-web.boys4ever.info. 3600 IN A 170.178.168.203
2469taxweb.boys4ever.info. 3600 IN A 170.178.168.203
2470taxonweb.boys4ever.info. 3600 IN A 170.178.168.203
2471telnet.boys4ever.info. 3600 IN A 170.178.168.203
2472telcobel.boys4ever.info. 3600 IN A 170.178.168.203
2473telerad.boys4ever.info. 3600 IN A 170.178.168.203
2474temporary.boys4ever.info. 3600 IN A 170.178.168.203
2475temporary-acc.boys4ever.info. 3600 IN A 170.178.168.203
2476test.boys4ever.info. 2932 IN A 170.178.168.203
2477test2.boys4ever.info. 3294 IN A 170.178.168.203
2478test3.boys4ever.info. 3294 IN A 170.178.168.203
2479testdiv.boys4ever.info. 3600 IN A 170.178.168.203
2480testncsa.boys4ever.info. 3600 IN A 170.178.168.203
2481tmd.boys4ever.info. 3600 IN A 170.178.168.203
2482tr.boys4ever.info. 3600 IN A 170.178.168.203
2483tourstat.boys4ever.info. 3600 IN A 170.178.168.203
2484training.boys4ever.info. 3293 IN A 170.178.168.203
2485transport.boys4ever.info. 3600 IN A 170.178.168.203
2486transis.boys4ever.info. 3600 IN A 170.178.168.203
2487travail.boys4ever.info. 3600 IN A 170.178.168.203
2488treasury.boys4ever.info. 3600 IN A 170.178.168.203
2489urbain.boys4ever.info. 3600 IN A 170.178.168.203
2490vbv.boys4ever.info. 3600 IN A 170.178.168.203
2491veniceclub.boys4ever.info. 3600 IN A 170.178.168.203
2492vbv-cprr.boys4ever.info. 3600 IN A 170.178.168.203
2493vereenvoudiging.boys4ever.info. 3600 IN A 170.178.168.203
2494verkeer.boys4ever.info. 3600 IN A 170.178.168.203
2495verkiezingsuitslagen.boys4ever.info. 3600 IN A 170.178.168.203
2496vervoer.boys4ever.info. 3600 IN A 170.178.168.203
2497veterans.boys4ever.info. 3600 IN A 170.178.168.203
2498veteransandvictims.boys4ever.info. 3600 IN A 170.178.168.203
2499vigilis.boys4ever.info. 3600 IN A 170.178.168.203
2500voedselveiligheid.boys4ever.info. 3600 IN A 170.178.168.203
2501vogelpest.boys4ever.info. 3600 IN A 170.178.168.203
2502volksgesundheit.boys4ever.info. 3600 IN A 170.178.168.203
2503volkstelling.boys4ever.info. 3600 IN A 170.178.168.203
2504vpn.boys4ever.info. 2927 IN A 170.178.168.203
2505volkstelling2011.boys4ever.info. 3600 IN A 170.178.168.203
2506vsp.boys4ever.info. 3600 IN A 170.178.168.203
2507w.boys4ever.info. 3291 IN A 170.178.168.203
2508wahlen.boys4ever.info. 3600 IN A 170.178.168.203
2509warvictims.boys4ever.info. 3600 IN A 170.178.168.203
2510webaccess.boys4ever.info. 3600 IN A 170.178.168.203
2511webcache.boys4ever.info. 3600 IN A 170.178.168.203
2512webdiv.boys4ever.info. 3600 IN A 170.178.168.203
2513webguide.boys4ever.info. 3600 IN A 170.178.168.203
2514webgids.boys4ever.info. 3600 IN A 170.178.168.203
2515webmail.boys4ever.info. 2924 IN A 170.178.168.203
2516webibz.boys4ever.info. 3600 IN A 170.178.168.203
2517webinterface.boys4ever.info. 3600 IN A 170.178.168.203
2518webtranslations.boys4ever.info. 3600 IN A 170.178.168.203
2519weekvandevervoering.boys4ever.info. 3600 IN A 170.178.168.203
2520win.boys4ever.info. 3290 IN A 170.178.168.203
2521westlant.boys4ever.info. 3600 IN A 170.178.168.203
2522workinginbelgium.boys4ever.info. 3600 IN A 170.178.168.203
2523ww.boys4ever.info. 3291 IN A 170.178.168.203
2524ww3.boys4ever.info. 3291 IN A 170.178.168.203
2525www.boys4ever.info. 2469 IN A 170.178.168.203
2526www2.boys4ever.info. 2924 IN A 170.178.168.203
2527xbrl-acc.boys4ever.info. 3600 IN A 170.178.168.203
2528zdfagehalter.boys4ever.info. 3600 IN A 170.178.168.203
2529zensus.boys4ever.info. 3600 IN A 170.178.168.203
2530zfa.boys4ever.info. 3600 IN A 170.178.168.203
2531zoek.boys4ever.info. 3600 IN A 170.178.168.203
2532zilverfonds.boys4ever.info. 3600 IN A 170.178.168.203
2533
2534
2535Launching Whois Queries:
2536_________________________
2537
2538 whois ip result: 91.195.240.0 -> 91.195.240.0/23
2539 whois ip result: 170.178.168.0 -> 170.178.160.0/19
2540
2541###################################################################################################################################
2542dnsenum VERSION:1.2.6
2543
2544----- ww17.boys4ever.info -----
2545
2546
2547Host's addresses:
2548__________________
2549
255011392.searchmagnified.com. 2 IN A 199.191.50.92
2551
2552
2553Wildcard detection using: ddsvkgykdakb
2554_______________________________________
2555
2556ddsvkgykdakb.ww17.boys4ever.info. 3600 IN A 170.178.168.203
2557
2558
2559!!!!!!!!!!!!!!!!!!!!!!!!!!!!
2560
2561 Wildcards detected, all subdomains will point to the same IP address
2562 Omitting results containing 170.178.168.203.
2563 Maybe you are using OpenDNS servers.
2564
2565!!!!!!!!!!!!!!!!!!!!!!!!!!!!
2566
2567
2568Name Servers:
2569______________
2570
2571ns2.cnomy.com. 54078 IN A 199.79.60.175
2572ns1.cnomy.com. 54078 IN A 208.91.196.175
2573
2574
2575Mail (MX) Servers:
2576___________________
2577
2578
2579
2580Trying Zone Transfers and getting Bind Versions:
2581_________________________________________________
2582
2583
2584Trying Zone Transfer for ww17.boys4ever.info on ns2.cnomy.com ...
2585
2586Trying Zone Transfer for ww17.boys4ever.info on ns1.cnomy.com ...
2587
2588
2589Brute forcing with /usr/share/sniper/wordlists/vhosts.txt:
2590___________________________________________________________
2591
2592admin.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2593ads.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2594adserver.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2595ap.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2596api.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2597app.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2598aptest.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2599beta.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2600cdn.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2601chat.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2602corp.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2603dashboard.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2604demo.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2605dev.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2606devel.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2607development.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2608direct.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2609dmz.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2610dns0.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2611dns1.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2612erp.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2613eshop.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2614exchange.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2615fileserver.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2616firewall.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2617forum.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2618ftp0.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2619git.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2620home.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2621id.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2622internal.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2623internet.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2624intra.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2625ldap.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2626linux.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2627local.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2628mail.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2629mirror.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2630monitor.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2631mssql.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2632mx0.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2633mx1.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2634news.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2635ns.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2636ns0.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2637ns1.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2638ntp.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2639ops.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2640oracle.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2641owa.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2642portal.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2643secure.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2644server.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2645sharepoint.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2646sql.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2647squid.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2648ssl.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2649stage.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2650staging.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2651syslog.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2652test1.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2653test2.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2654testing.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2655uat.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2656v1.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2657v3.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2658vm.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2659vnc.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2660voip.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2661web.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2662web2test.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2663www2.ww17.boys4ever.info. 3600 IN A 70.32.1.32
2664
2665
2666ww17.boys4ever.info class C netranges:
2667_______________________________________
2668
2669 70.32.1.0/24
2670
2671
2672ww17.boys4ever.info ip blocks:
2673_______________________________
2674
2675 70.32.1.32/32
2676
2677done.
2678###################################################################################################################################
2679Source:
2680whois.arin.net
2681IP Address:
2682199.191.50.92
2683Name:
2684CN
2685Handle:
2686NET-199-191-50-0-1
2687Registration Date:
26887/9/15
2689Range:
2690199.191.50.0-199.191.51.255
2691Org:
2692Confluence Networks Inc
2693Org Handle:
2694CN
2695Address:
26963rd Floor, J & C Building, P.O. Box 362
2697City:
2698Road Town
2699State/Province:
2700Tortola
2701Postal Code:
2702VG1110
2703Country:
2704Virgin Islands, British
2705Name Servers:
2706###################################################################################################################################
2707URLCrazy Domain Report
2708Domain : ww17.boys4ever.info
2709Keyboard : qwerty
2710At : 2020-02-10 16:24:42 -0500
2711
2712# Please wait. 178 hostnames to process
2713
2714Typo Type Typo DNS-A CC-A DNS-MX Extn
2715------------------------------------------------------------------------------------------------------------------------------
2716Character Omission w17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2717Character Omission ww1.boys4ever.info 91.195.240.46 ��, park-mx.above.com info
2718Character Omission ww17.bos4ever.info ? info
2719Character Omission ww17.boy4ever.info ? info
2720Character Omission ww17.boys4eer.info ? info
2721Character Omission ww17.boys4eve.info ? info
2722Character Omission ww17.boys4evr.info ? info
2723Character Omission ww17.boys4ver.info ? info
2724Character Omission ww17.boysever.info ? info
2725Character Omission ww17.bys4ever.info ? info
2726Character Omission ww17.oys4ever.info ? info
2727Character Omission ww17boys4ever.info ? info
2728Character Omission ww7.boys4ever.info 141.8.225.51 CH,SWITZERLAND park-mx.above.com info
2729Character Repeat ww117.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2730Character Repeat ww17.bboys4ever.info ? info
2731Character Repeat ww17.booys4ever.info ? info
2732Character Repeat ww17.boys44ever.info ? info
2733Character Repeat ww17.boys4eever.info ? info
2734Character Repeat ww17.boys4eveer.info ? info
2735Character Repeat ww17.boys4everr.info ? info
2736Character Repeat ww17.boys4evver.info ? info
2737Character Repeat ww17.boyss4ever.info ? info
2738Character Repeat ww17.boyys4ever.info ? info
2739Character Repeat ww177.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2740Character Repeat www17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2741Character Swap w1w7.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2742Character Swap ww1.7boys4ever.info ? info
2743Character Swap ww17.bosy4ever.info ? info
2744Character Swap ww17.boy4sever.info ? info
2745Character Swap ww17.boys4eevr.info ? info
2746Character Swap ww17.boys4evre.info ? info
2747Character Swap ww17.boys4veer.info ? info
2748Character Swap ww17.boyse4ver.info ? info
2749Character Swap ww17.byos4ever.info ? info
2750Character Swap ww17.obys4ever.info ? info
2751Character Swap ww17b.oys4ever.info ? info
2752Character Swap ww71.boys4ever.info ? park-mx.above.com info
2753Character Replacement ew17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2754Character Replacement qw17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2755Character Replacement we17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2756Character Replacement wq17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2757Character Replacement ww16.boys4ever.info ? info
2758Character Replacement ww17.biys4ever.info ? info
2759Character Replacement ww17.bots4ever.info ? info
2760Character Replacement ww17.bous4ever.info ? info
2761Character Replacement ww17.boya4ever.info ? info
2762Character Replacement ww17.boyd4ever.info ? info
2763Character Replacement ww17.boys3ever.info ? info
2764Character Replacement ww17.boys4eber.info ? info
2765Character Replacement ww17.boys4ecer.info ? info
2766Character Replacement ww17.boys4evee.info ? info
2767Character Replacement ww17.boys4evet.info ? info
2768Character Replacement ww17.boys4evrr.info ? info
2769Character Replacement ww17.boys4evwr.info ? info
2770Character Replacement ww17.boys4rver.info ? info
2771Character Replacement ww17.boys4wver.info ? info
2772Character Replacement ww17.boys5ever.info ? info
2773Character Replacement ww17.bpys4ever.info ? info
2774Character Replacement ww17.noys4ever.info ? info
2775Character Replacement ww17.voys4ever.info ? info
2776Character Replacement ww18.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2777Character Replacement ww27.boys4ever.info ? park-mx.above.com info
2778Double Character Replacement ee17.boys4ever.info 70.32.1.32 ��, park-mx.above.com info
2779Double Character Replacement qq17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2780Character Insertion wew17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2781Character Insertion wqw17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2782Character Insertion ww127.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2783Character Insertion ww17.bnoys4ever.info ? info
2784Character Insertion ww17.boiys4ever.info ? info
2785Character Insertion ww17.bopys4ever.info ? info
2786Character Insertion ww17.boys43ever.info ? info
2787Character Insertion ww17.boys45ever.info ? info
2788Character Insertion ww17.boys4erver.info ? info
2789Character Insertion ww17.boys4evber.info ? info
2790Character Insertion ww17.boys4evcer.info ? info
2791Character Insertion ww17.boys4evere.info ? info
2792Character Insertion ww17.boys4evert.info ? info
2793Character Insertion ww17.boys4evewr.info ? info
2794Character Insertion ww17.boys4ewver.info ? info
2795Character Insertion ww17.boysa4ever.info ? info
2796Character Insertion ww17.boysd4ever.info ? info
2797Character Insertion ww17.boyts4ever.info ? info
2798Character Insertion ww17.boyus4ever.info ? info
2799Character Insertion ww17.bvoys4ever.info ? info
2800Character Insertion ww176.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2801Character Insertion ww178.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2802Character Insertion wwe17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2803Character Insertion wwq17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2804Missing Dot wwwww17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2805Singular or Pluralise boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2806Singular or Pluralise boys4evers.info ? info
2807Vowel Swap ww17.boys4avar.info ? info
2808Vowel Swap ww17.boys4ivir.info ? info
2809Vowel Swap ww17.boys4ovor.info ? info
2810Vowel Swap ww17.boys4uvur.info ? info
2811Homophones ww17.buoys4ever.info ? info
2812Bit Flipping 7w17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2813Bit Flipping gw17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2814Bit Flipping sw17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2815Bit Flipping uw17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2816Bit Flipping vw17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2817Bit Flipping w717.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2818Bit Flipping wg17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2819Bit Flipping ws17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2820Bit Flipping wu17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2821Bit Flipping wv17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2822Bit Flipping ww07.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2823Bit Flipping ww13.boys4ever.info 72.52.179.175 US,UNITED STATES mx156.hostedmxserver.com info
2824Bit Flipping ww15.boys4ever.info 65.19.157.198 RU,RUSSIAN FEDERATION park-mx.above.com info
2825Bit Flipping ww17.bgys4ever.info ? info
2826Bit Flipping ww17.bkys4ever.info ? info
2827Bit Flipping ww17.bmys4ever.info ? info
2828Bit Flipping ww17.bnys4ever.info ? info
2829Bit Flipping ww17.bo9s4ever.info ? info
2830Bit Flipping ww17.bois4ever.info ? info
2831Bit Flipping ww17.boqs4ever.info ? info
2832Bit Flipping ww17.boxs4ever.info ? info
2833Bit Flipping ww17.boy34ever.info ? info
2834Bit Flipping ww17.boyc4ever.info ? info
2835Bit Flipping ww17.boyq4ever.info ? info
2836Bit Flipping ww17.boyr4ever.info ? info
2837Bit Flipping ww17.boys0ever.info ? info
2838Bit Flipping ww17.boys4aver.info ? info
2839Bit Flipping ww17.boys4dver.info ? info
2840Bit Flipping ww17.boys4e6er.info ? info
2841Bit Flipping ww17.boys4efer.info ? info
2842Bit Flipping ww17.boys4erer.info ? info
2843Bit Flipping ww17.boys4eter.info ? info
2844Bit Flipping ww17.boys4evar.info ? info
2845Bit Flipping ww17.boys4evdr.info ? info
2846Bit Flipping ww17.boys4eve2.info ? info
2847Bit Flipping ww17.boys4eveb.info ? info
2848Bit Flipping ww17.boys4evep.info ? info
2849Bit Flipping ww17.boys4ever.i.fo 217.116.232.226 DK,DENMARK mx3.gigahost.dk fo
2850Bit Flipping ww17.boys4eves.info ? info
2851Bit Flipping ww17.boys4evev.info ? info
2852Bit Flipping ww17.boys4evez.info ? info
2853Bit Flipping ww17.boys4evgr.info ? info
2854Bit Flipping ww17.boys4evmr.info ? info
2855Bit Flipping ww17.boys4evur.info ? info
2856Bit Flipping ww17.boys4ewer.info ? info
2857Bit Flipping ww17.boys4gver.info ? info
2858Bit Flipping ww17.boys4mver.info ? info
2859Bit Flipping ww17.boys4uver.info ? info
2860Bit Flipping ww17.boys6ever.info ? info
2861Bit Flipping ww17.boystever.info ? info
2862Bit Flipping ww17.boyw4ever.info ? info
2863Bit Flipping ww17.coys4ever.info ? info
2864Bit Flipping ww17.foys4ever.info ? info
2865Bit Flipping ww17.joys4ever.info ? info
2866Bit Flipping ww17.roys4ever.info ? info
2867Bit Flipping ww17nboys4ever.info ? info
2868Bit Flipping ww1w.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2869Bit Flipping ww37.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2870Bit Flipping ww57.boys4ever.info ? park-mx.above.com info
2871Bit Flipping ww97.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2872Bit Flipping wwq7.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2873Homoglyphs vvvv17.boys4ever.info 70.32.1.32 US,UNITED STATES park-mx.above.com info
2874Homoglyphs vvw17.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2875Homoglyphs wvv17.boys4ever.info 170.178.168.203 ��, park-mx.above.com info
2876Homoglyphs ww17.b0ys4ever.info ? info
2877Homoglyphs wwl7.boys4ever.info 170.178.168.203 US,UNITED STATES park-mx.above.com info
2878Wrong TLD boys4ever.ca ? ca
2879Wrong TLD boys4ever.ch ? ch
2880Wrong TLD boys4ever.com 35.186.238.101 US,UNITED STATES com
2881Wrong TLD boys4ever.de ? de
2882Wrong TLD boys4ever.edu ? edu
2883Wrong TLD boys4ever.es ? es
2884Wrong TLD boys4ever.fr ? fr
2885Wrong TLD boys4ever.it ? it
2886Wrong TLD boys4ever.jp ? jp
2887Wrong TLD boys4ever.net ? net
2888Wrong TLD boys4ever.nl ? nl
2889Wrong TLD boys4ever.no ? no
2890Wrong TLD boys4ever.org ? org
2891Wrong TLD boys4ever.ru ? ru
2892Wrong TLD boys4ever.se ? se
2893Wrong TLD boys4ever.us ? us
2894###################################################################################################################################
2895[*] Processing domain ww17.boys4ever.info
2896[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
2897[+] Getting nameservers
2898208.91.196.175 - ns1.cnomy.com
2899199.79.60.175 - ns2.cnomy.com
2900[-] Zone transfer failed
2901
2902[+] TXT records found
2903"v=spf1 a -all"
2904
2905[+] Wildcard domain found - 70.32.1.32
2906[*] Scanning ww17.boys4ever.info for A records
2907199.191.50.92 - ww17.boys4ever.info
2908170.178.168.203 - 01.ww17.boys4ever.info
2909170.178.168.203 - 11.ww17.boys4ever.info
2910170.178.168.203 - 1.ww17.boys4ever.info
2911170.178.168.203 - 03.ww17.boys4ever.info
2912170.178.168.203 - 02.ww17.boys4ever.info
2913170.178.168.203 - 12.ww17.boys4ever.info
2914170.178.168.203 - 13.ww17.boys4ever.info
2915170.178.168.203 - 18.ww17.boys4ever.info
2916170.178.168.203 - 16.ww17.boys4ever.info
2917170.178.168.203 - 19.ww17.boys4ever.info
2918170.178.168.203 - 17.ww17.boys4ever.info
2919170.178.168.203 - 15.ww17.boys4ever.info
2920170.178.168.203 - 3.ww17.boys4ever.info
2921170.178.168.203 - 5.ww17.boys4ever.info
2922170.178.168.203 - 6.ww17.boys4ever.info
2923170.178.168.203 - 20.ww17.boys4ever.info
2924170.178.168.203 - a01.ww17.boys4ever.info
2925170.178.168.203 - a.ww17.boys4ever.info
2926170.178.168.203 - a1.ww17.boys4ever.info
2927170.178.168.203 - abc.ww17.boys4ever.info
2928170.178.168.203 - a2.ww17.boys4ever.info
2929170.178.168.203 - acceso.ww17.boys4ever.info
2930170.178.168.203 - ac.ww17.boys4ever.info
2931170.178.168.203 - accounting.ww17.boys4ever.info
2932170.178.168.203 - ad.ww17.boys4ever.info
2933170.178.168.203 - adkit.ww17.boys4ever.info
2934170.178.168.203 - administrador.ww17.boys4ever.info
2935170.178.168.203 - adsl.ww17.boys4ever.info
2936170.178.168.203 - admins.ww17.boys4ever.info
2937170.178.168.203 - administrators.ww17.boys4ever.info
2938170.178.168.203 - administrator.ww17.boys4ever.info
2939170.178.168.203 - af.ww17.boys4ever.info
2940170.178.168.203 - aix.ww17.boys4ever.info
2941170.178.168.203 - alaska.ww17.boys4ever.info
2942170.178.168.203 - alpha.ww17.boys4ever.info
2943170.178.168.203 - alerts.ww17.boys4ever.info
2944170.178.168.203 - alterwind.ww17.boys4ever.info
2945170.178.168.203 - am.ww17.boys4ever.info
2946170.178.168.203 - anaheim.ww17.boys4ever.info
2947170.178.168.203 - announce.ww17.boys4ever.info
2948170.178.168.203 - apache.ww17.boys4ever.info
2949170.178.168.203 - antivirus.ww17.boys4ever.info
2950170.178.168.203 - announcements.ww17.boys4ever.info
2951170.178.168.203 - apollo.ww17.boys4ever.info
2952170.178.168.203 - apps.ww17.boys4ever.info
2953170.178.168.203 - application.ww17.boys4ever.info
2954170.178.168.203 - appserver.ww17.boys4ever.info
2955170.178.168.203 - app01.ww17.boys4ever.info
2956170.178.168.203 - aq.ww17.boys4ever.info
2957170.178.168.203 - archie.ww17.boys4ever.info
2958170.178.168.203 - as.ww17.boys4ever.info
2959170.178.168.203 - asterix.ww17.boys4ever.info
2960170.178.168.203 - at.ww17.boys4ever.info
2961170.178.168.203 - atlanta.ww17.boys4ever.info
2962170.178.168.203 - athena.ww17.boys4ever.info
2963170.178.168.203 - asia.ww17.boys4ever.info
2964170.178.168.203 - att.ww17.boys4ever.info
2965170.178.168.203 - au.ww17.boys4ever.info
2966170.178.168.203 - auth.ww17.boys4ever.info
2967170.178.168.203 - auto.ww17.boys4ever.info
2968170.178.168.203 - autorun.ww17.boys4ever.info
2969170.178.168.203 - auction.ww17.boys4ever.info
2970170.178.168.203 - av.ww17.boys4ever.info
2971170.178.168.203 - aw.ww17.boys4ever.info
2972170.178.168.203 - ayuda.ww17.boys4ever.info
2973170.178.168.203 - b.ww17.boys4ever.info
2974170.178.168.203 - b01.ww17.boys4ever.info
2975170.178.168.203 - b.auth-ns.ww17.boys4ever.info
2976170.178.168.203 - backup.ww17.boys4ever.info
2977170.178.168.203 - b2b.ww17.boys4ever.info
2978170.178.168.203 - b2c.ww17.boys4ever.info
2979170.178.168.203 - backend.ww17.boys4ever.info
2980170.178.168.203 - ba.ww17.boys4ever.info
2981170.178.168.203 - back.ww17.boys4ever.info
2982170.178.168.203 - bakersfield.ww17.boys4ever.info
2983170.178.168.203 - balancer.ww17.boys4ever.info
2984170.178.168.203 - bb.ww17.boys4ever.info
2985170.178.168.203 - banking.ww17.boys4ever.info
2986170.178.168.203 - baltimore.ww17.boys4ever.info
2987170.178.168.203 - bayarea.ww17.boys4ever.info
2988170.178.168.203 - bbdd.ww17.boys4ever.info
2989170.178.168.203 - bd.ww17.boys4ever.info
2990170.178.168.203 - be.ww17.boys4ever.info
2991170.178.168.203 - black.ww17.boys4ever.info
2992170.178.168.203 - blog.ww17.boys4ever.info
2993170.178.168.203 - blackberry.ww17.boys4ever.info
2994170.178.168.203 - bm.ww17.boys4ever.info
2995170.178.168.203 - bn.ww17.boys4ever.info
2996170.178.168.203 - boise.ww17.boys4ever.info
2997170.178.168.203 - bolsa.ww17.boys4ever.info
2998170.178.168.203 - boston.ww17.boys4ever.info
2999170.178.168.203 - broadcast.ww17.boys4ever.info
3000170.178.168.203 - brazil.ww17.boys4ever.info
3001170.178.168.203 - bronze.ww17.boys4ever.info
3002170.178.168.203 - brown.ww17.boys4ever.info
3003170.178.168.203 - bsd.ww17.boys4ever.info
3004170.178.168.203 - bs.ww17.boys4ever.info
3005170.178.168.203 - bsd2.ww17.boys4ever.info
3006170.178.168.203 - buy.ww17.boys4ever.info
3007170.178.168.203 - buscador.ww17.boys4ever.info
3008170.178.168.203 - bw.ww17.boys4ever.info
3009170.178.168.203 - bv.ww17.boys4ever.info
3010170.178.168.203 - by.ww17.boys4ever.info
3011170.178.168.203 - c.auth-ns.ww17.boys4ever.info
3012170.178.168.203 - bz.ww17.boys4ever.info
3013170.178.168.203 - cache.ww17.boys4ever.info
3014170.178.168.203 - cafe.ww17.boys4ever.info
3015170.178.168.203 - call.ww17.boys4ever.info
3016170.178.168.203 - calvin.ww17.boys4ever.info
3017170.178.168.203 - canada.ww17.boys4ever.info
3018170.178.168.203 - canon.ww17.boys4ever.info
3019170.178.168.203 - canal.ww17.boys4ever.info
3020170.178.168.203 - catalog.ww17.boys4ever.info
3021170.178.168.203 - careers.ww17.boys4ever.info
3022170.178.168.203 - cc.ww17.boys4ever.info
3023170.178.168.203 - cert.ww17.boys4ever.info
3024170.178.168.203 - certify.ww17.boys4ever.info
3025170.178.168.203 - cf.ww17.boys4ever.info
3026170.178.168.203 - certserv.ww17.boys4ever.info
3027170.178.168.203 - channel.ww17.boys4ever.info
3028170.178.168.203 - ch.ww17.boys4ever.info
3029170.178.168.203 - charlie.ww17.boys4ever.info
3030170.178.168.203 - chats.ww17.boys4ever.info
3031170.178.168.203 - ci.ww17.boys4ever.info
3032170.178.168.203 - chicago.ww17.boys4ever.info
3033170.178.168.203 - citrix.ww17.boys4ever.info
3034170.178.168.203 - cincinnati.ww17.boys4ever.info
3035170.178.168.203 - cisco.ww17.boys4ever.info
3036170.178.168.203 - cl.ww17.boys4ever.info
3037170.178.168.203 - classifieds.ww17.boys4ever.info
3038170.178.168.203 - cleveland.ww17.boys4ever.info
3039170.178.168.203 - clicktrack.ww17.boys4ever.info
3040170.178.168.203 - client.ww17.boys4ever.info
3041170.178.168.203 - clientes.ww17.boys4ever.info
3042170.178.168.203 - clients.ww17.boys4ever.info
3043170.178.168.203 - clubs.ww17.boys4ever.info
3044170.178.168.203 - club.ww17.boys4ever.info
3045170.178.168.203 - clusters.ww17.boys4ever.info
3046170.178.168.203 - cm.ww17.boys4ever.info
3047170.178.168.203 - cms.ww17.boys4ever.info
3048170.178.168.203 - co.ww17.boys4ever.info
3049170.178.168.203 - cocoa.ww17.boys4ever.info
3050170.178.168.203 - cn.ww17.boys4ever.info
3051170.178.168.203 - code.ww17.boys4ever.info
3052170.178.168.203 - colombus.ww17.boys4ever.info
3053170.178.168.203 - columbus.ww17.boys4ever.info
3054170.178.168.203 - communigate.ww17.boys4ever.info
3055170.178.168.203 - commerceserver.ww17.boys4ever.info
3056170.178.168.203 - community.ww17.boys4ever.info
3057170.178.168.203 - concentrator.ww17.boys4ever.info
3058170.178.168.203 - conf.ww17.boys4ever.info
3059170.178.168.203 - confidential.ww17.boys4ever.info
3060170.178.168.203 - consola.ww17.boys4ever.info
3061170.178.168.203 - consultant.ww17.boys4ever.info
3062170.178.168.203 - contact.ww17.boys4ever.info
3063170.178.168.203 - contracts.ww17.boys4ever.info
3064170.178.168.203 - core01.ww17.boys4ever.info
3065170.178.168.203 - core.ww17.boys4ever.info
3066170.178.168.203 - correo.ww17.boys4ever.info
3067170.178.168.203 - cr.ww17.boys4ever.info
3068170.178.168.203 - counterstrike.ww17.boys4ever.info
3069170.178.168.203 - cricket.ww17.boys4ever.info
3070170.178.168.203 - crs.ww17.boys4ever.info
3071170.178.168.203 - cu.ww17.boys4ever.info
3072170.178.168.203 - ct.ww17.boys4ever.info
3073170.178.168.203 - cso.ww17.boys4ever.info
3074170.178.168.203 - css.ww17.boys4ever.info
3075170.178.168.203 - cust101.ww17.boys4ever.info
3076170.178.168.203 - cust103.ww17.boys4ever.info
3077170.178.168.203 - cust102.ww17.boys4ever.info
3078170.178.168.203 - cust106.ww17.boys4ever.info
3079170.178.168.203 - cust108.ww17.boys4ever.info
3080170.178.168.203 - cust109.ww17.boys4ever.info
3081170.178.168.203 - cust110.ww17.boys4ever.info
3082170.178.168.203 - cust11.ww17.boys4ever.info
3083170.178.168.203 - cust114.ww17.boys4ever.info
3084170.178.168.203 - cust115.ww17.boys4ever.info
3085170.178.168.203 - cust119.ww17.boys4ever.info
3086170.178.168.203 - cust117.ww17.boys4ever.info
3087170.178.168.203 - cust12.ww17.boys4ever.info
3088170.178.168.203 - cust121.ww17.boys4ever.info
3089170.178.168.203 - cust122.ww17.boys4ever.info
3090170.178.168.203 - cust124.ww17.boys4ever.info
3091170.178.168.203 - cust126.ww17.boys4ever.info
3092170.178.168.203 - cust125.ww17.boys4ever.info
3093170.178.168.203 - cust14.ww17.boys4ever.info
3094170.178.168.203 - cust2.ww17.boys4ever.info
3095170.178.168.203 - cust18.ww17.boys4ever.info
3096170.178.168.203 - cust22.ww17.boys4ever.info
3097170.178.168.203 - cust26.ww17.boys4ever.info
3098170.178.168.203 - cust31.ww17.boys4ever.info
3099170.178.168.203 - cust34.ww17.boys4ever.info
3100170.178.168.203 - cust33.ww17.boys4ever.info
3101170.178.168.203 - cust36.ww17.boys4ever.info
3102170.178.168.203 - cust40.ww17.boys4ever.info
3103170.178.168.203 - cust38.ww17.boys4ever.info
3104170.178.168.203 - cust39.ww17.boys4ever.info
3105170.178.168.203 - cust43.ww17.boys4ever.info
3106170.178.168.203 - cust49.ww17.boys4ever.info
3107170.178.168.203 - cust48.ww17.boys4ever.info
3108170.178.168.203 - cust5.ww17.boys4ever.info
3109170.178.168.203 - cust51.ww17.boys4ever.info
3110170.178.168.203 - cust55.ww17.boys4ever.info
3111170.178.168.203 - cust54.ww17.boys4ever.info
3112170.178.168.203 - cust56.ww17.boys4ever.info
3113170.178.168.203 - cust53.ww17.boys4ever.info
3114170.178.168.203 - cust57.ww17.boys4ever.info
3115170.178.168.203 - cust58.ww17.boys4ever.info
3116170.178.168.203 - cust60.ww17.boys4ever.info
3117170.178.168.203 - cust65.ww17.boys4ever.info
3118170.178.168.203 - cust66.ww17.boys4ever.info
3119170.178.168.203 - cust67.ww17.boys4ever.info
3120170.178.168.203 - cust7.ww17.boys4ever.info
3121170.178.168.203 - cust69.ww17.boys4ever.info
3122170.178.168.203 - cust75.ww17.boys4ever.info
3123170.178.168.203 - cust78.ww17.boys4ever.info
3124170.178.168.203 - cust8.ww17.boys4ever.info
3125170.178.168.203 - cust80.ww17.boys4ever.info
3126170.178.168.203 - cust81.ww17.boys4ever.info
3127170.178.168.203 - cust83.ww17.boys4ever.info
3128170.178.168.203 - cust85.ww17.boys4ever.info
3129170.178.168.203 - cust86.ww17.boys4ever.info
3130170.178.168.203 - cust82.ww17.boys4ever.info
3131170.178.168.203 - cust84.ww17.boys4ever.info
3132170.178.168.203 - cust87.ww17.boys4ever.info
3133170.178.168.203 - cust92.ww17.boys4ever.info
3134170.178.168.203 - cust91.ww17.boys4ever.info
3135170.178.168.203 - cust93.ww17.boys4ever.info
3136170.178.168.203 - cust89.ww17.boys4ever.info
3137170.178.168.203 - cust96.ww17.boys4ever.info
3138170.178.168.203 - cust97.ww17.boys4ever.info
3139170.178.168.203 - cust98.ww17.boys4ever.info
3140170.178.168.203 - cust99.ww17.boys4ever.info
3141170.178.168.203 - cvs.ww17.boys4ever.info
3142170.178.168.203 - database.ww17.boys4ever.info
3143170.178.168.203 - cx.ww17.boys4ever.info
3144170.178.168.203 - cy.ww17.boys4ever.info
3145170.178.168.203 - cz.ww17.boys4ever.info
3146170.178.168.203 - dallas.ww17.boys4ever.info
3147170.178.168.203 - database02.ww17.boys4ever.info
3148170.178.168.203 - databases.ww17.boys4ever.info
3149170.178.168.203 - database1.ww17.boys4ever.info
3150170.178.168.203 - datastore.ww17.boys4ever.info
3151170.178.168.203 - db.ww17.boys4ever.info
3152170.178.168.203 - db2.ww17.boys4ever.info
3153170.178.168.203 - db1.ww17.boys4ever.info
3154170.178.168.203 - db02.ww17.boys4ever.info
3155170.178.168.203 - dell.ww17.boys4ever.info
3156170.178.168.203 - delta.ww17.boys4ever.info
3157170.178.168.203 - delta1.ww17.boys4ever.info
3158170.178.168.203 - denver.ww17.boys4ever.info
3159170.178.168.203 - desarrollo.ww17.boys4ever.info
3160170.178.168.203 - demonstration.ww17.boys4ever.info
3161170.178.168.203 - dev0.ww17.boys4ever.info
3162170.178.168.203 - designer.ww17.boys4ever.info
3163170.178.168.203 - develop.ww17.boys4ever.info
3164170.178.168.203 - devserver.ww17.boys4ever.info
3165170.178.168.203 - device.ww17.boys4ever.info
3166170.178.168.203 - devsql.ww17.boys4ever.info
3167170.178.168.203 - dhcp.ww17.boys4ever.info
3168170.178.168.203 - directory.ww17.boys4ever.info
3169170.178.168.203 - dir.ww17.boys4ever.info
3170170.178.168.203 - dilbert.ww17.boys4ever.info
3171170.178.168.203 - digital.ww17.boys4ever.info
3172170.178.168.203 - disc.ww17.boys4ever.info
3173170.178.168.203 - discuss.ww17.boys4ever.info
3174170.178.168.203 - disk.ww17.boys4ever.info
3175170.178.168.203 - disney.ww17.boys4ever.info
3176170.178.168.203 - distributer.ww17.boys4ever.info
3177170.178.168.203 - discussions.ww17.boys4ever.info
3178170.178.168.203 - distributers.ww17.boys4ever.info
3179170.178.168.203 - dj.ww17.boys4ever.info
3180170.178.168.203 - dk.ww17.boys4ever.info
3181170.178.168.203 - dns.ww17.boys4ever.info
3182170.178.168.203 - dnews.ww17.boys4ever.info
3183170.178.168.203 - dns2.ww17.boys4ever.info
3184170.178.168.203 - docs.ww17.boys4ever.info
3185170.178.168.203 - documentacion.ww17.boys4ever.info
3186170.178.168.203 - domains.ww17.boys4ever.info
3187170.178.168.203 - dominio.ww17.boys4ever.info
3188170.178.168.203 - dominoweb.ww17.boys4ever.info
3189170.178.168.203 - download.ww17.boys4ever.info
3190170.178.168.203 - downloads.ww17.boys4ever.info
3191170.178.168.203 - downtown.ww17.boys4ever.info
3192170.178.168.203 - dyn.ww17.boys4ever.info
3193170.178.168.203 - drupal.ww17.boys4ever.info
3194170.178.168.203 - dz.ww17.boys4ever.info
3195170.178.168.203 - dynip.ww17.boys4ever.info
3196170.178.168.203 - e-com.ww17.boys4ever.info
3197170.178.168.203 - e.ww17.boys4ever.info
3198170.178.168.203 - e-commerce.ww17.boys4ever.info
3199170.178.168.203 - earth.ww17.boys4ever.info
3200170.178.168.203 - eagle.ww17.boys4ever.info
3201170.178.168.203 - east.ww17.boys4ever.info
3202170.178.168.203 - ecom.ww17.boys4ever.info
3203170.178.168.203 - edu.ww17.boys4ever.info
3204170.178.168.203 - education.ww17.boys4ever.info
3205170.178.168.203 - ejemplo.ww17.boys4ever.info
3206170.178.168.203 - ee.ww17.boys4ever.info
3207170.178.168.203 - empresa.ww17.boys4ever.info
3208170.178.168.203 - engine.ww17.boys4ever.info
3209170.178.168.203 - en.ww17.boys4ever.info
3210170.178.168.203 - enable.ww17.boys4ever.info
3211170.178.168.203 - eng01.ww17.boys4ever.info
3212170.178.168.203 - empresas.ww17.boys4ever.info
3213170.178.168.203 - eng.ww17.boys4ever.info
3214170.178.168.203 - eng1.ww17.boys4ever.info
3215170.178.168.203 - engineer.ww17.boys4ever.info
3216170.178.168.203 - es.ww17.boys4ever.info
3217170.178.168.203 - espanol.ww17.boys4ever.info
3218170.178.168.203 - europe.ww17.boys4ever.info
3219170.178.168.203 - eta.ww17.boys4ever.info
3220170.178.168.203 - esx.ww17.boys4ever.info
3221170.178.168.203 - exec.ww17.boys4ever.info
3222170.178.168.203 - f5.ww17.boys4ever.info
3223170.178.168.203 - faststats.ww17.boys4ever.info
3224170.178.168.203 - farm.ww17.boys4ever.info
3225170.178.168.203 - fi.ww17.boys4ever.info
3226170.178.168.203 - filestore.ww17.boys4ever.info
3227170.178.168.203 - filter.ww17.boys4ever.info
3228170.178.168.203 - flash.ww17.boys4ever.info
3229170.178.168.203 - fix.ww17.boys4ever.info
3230170.178.168.203 - fixes.ww17.boys4ever.info
3231170.178.168.203 - fj.ww17.boys4ever.info
3232170.178.168.203 - fl.ww17.boys4ever.info
3233170.178.168.203 - finger.ww17.boys4ever.info
3234170.178.168.203 - foobar.ww17.boys4ever.info
3235170.178.168.203 - flow.ww17.boys4ever.info
3236170.178.168.203 - fm.ww17.boys4ever.info
3237170.178.168.203 - fotos.ww17.boys4ever.info
3238170.178.168.203 - fox.ww17.boys4ever.info
3239170.178.168.203 - forums.ww17.boys4ever.info
3240170.178.168.203 - foundry.ww17.boys4ever.info
3241170.178.168.203 - france.ww17.boys4ever.info
3242170.178.168.203 - fr.ww17.boys4ever.info
3243170.178.168.203 - freebsd01.ww17.boys4ever.info
3244170.178.168.203 - fred.ww17.boys4ever.info
3245170.178.168.203 - freebsd1.ww17.boys4ever.info
3246170.178.168.203 - freebsd2.ww17.boys4ever.info
3247170.178.168.203 - front.ww17.boys4ever.info
3248170.178.168.203 - frontdesk.ww17.boys4ever.info
3249170.178.168.203 - freeware.ww17.boys4ever.info
3250170.178.168.203 - ftp.ww17.boys4ever.info
3251170.178.168.203 - fw-1.ww17.boys4ever.info
3252170.178.168.203 - ftp-.ww17.boys4ever.info
3253170.178.168.203 - fw1.ww17.boys4ever.info
3254170.178.168.203 - fwsm01.ww17.boys4ever.info
3255170.178.168.203 - galeria.ww17.boys4ever.info
3256170.178.168.203 - galerias.ww17.boys4ever.info
3257170.178.168.203 - gate.ww17.boys4ever.info
3258170.178.168.203 - gatekeeper.ww17.boys4ever.info
3259170.178.168.203 - gandalf.ww17.boys4ever.info
3260170.178.168.203 - gateway.ww17.boys4ever.info
3261170.178.168.203 - gd.ww17.boys4ever.info
3262170.178.168.203 - ge.ww17.boys4ever.info
3263170.178.168.203 - general.ww17.boys4ever.info
3264170.178.168.203 - gemini.ww17.boys4ever.info
3265170.178.168.203 - georgia.ww17.boys4ever.info
3266170.178.168.203 - germany.ww17.boys4ever.info
3267170.178.168.203 - gf.ww17.boys4ever.info
3268170.178.168.203 - gm.ww17.boys4ever.info
3269170.178.168.203 - glendale.ww17.boys4ever.info
3270170.178.168.203 - golf.ww17.boys4ever.info
3271170.178.168.203 - gn.ww17.boys4ever.info
3272170.178.168.203 - gp.ww17.boys4ever.info
3273170.178.168.203 - green.ww17.boys4ever.info
3274170.178.168.203 - gw.ww17.boys4ever.info
3275170.178.168.203 - guest.ww17.boys4ever.info
3276170.178.168.203 - gu.ww17.boys4ever.info
3277170.178.168.203 - h.ww17.boys4ever.info
3278170.178.168.203 - gy.ww17.boys4ever.info
3279170.178.168.203 - halflife.ww17.boys4ever.info
3280170.178.168.203 - helpdesk.ww17.boys4ever.info
3281170.178.168.203 - help.ww17.boys4ever.info
3282170.178.168.203 - hawaii.ww17.boys4ever.info
3283170.178.168.203 - helponline.ww17.boys4ever.info
3284170.178.168.203 - hermes.ww17.boys4ever.info
3285170.178.168.203 - hello.ww17.boys4ever.info
3286170.178.168.203 - hi.ww17.boys4ever.info
3287170.178.168.203 - hm.ww17.boys4ever.info
3288170.178.168.203 - hn.ww17.boys4ever.info
3289170.178.168.203 - hobbes.ww17.boys4ever.info
3290170.178.168.203 - host.ww17.boys4ever.info
3291170.178.168.203 - honolulu.ww17.boys4ever.info
3292170.178.168.203 - honeypot.ww17.boys4ever.info
3293170.178.168.203 - homebase.ww17.boys4ever.info
3294170.178.168.203 - host1.ww17.boys4ever.info
3295170.178.168.203 - houstin.ww17.boys4ever.info
3296170.178.168.203 - hotjobs.ww17.boys4ever.info
3297170.178.168.203 - hp.ww17.boys4ever.info
3298170.178.168.203 - http.ww17.boys4ever.info
3299170.178.168.203 - ht.ww17.boys4ever.info
3300170.178.168.203 - hu.ww17.boys4ever.info
3301170.178.168.203 - humanresources.ww17.boys4ever.info
3302170.178.168.203 - hr.ww17.boys4ever.info
3303170.178.168.203 - ia.ww17.boys4ever.info
3304170.178.168.203 - ida.ww17.boys4ever.info
3305170.178.168.203 - ias.ww17.boys4ever.info
3306170.178.168.203 - images.ww17.boys4ever.info
3307170.178.168.203 - imap.ww17.boys4ever.info
3308170.178.168.203 - im.ww17.boys4ever.info
3309170.178.168.203 - imail.ww17.boys4ever.info
3310170.178.168.203 - img02.ww17.boys4ever.info
3311170.178.168.203 - in.ww17.boys4ever.info
3312170.178.168.203 - img0.ww17.boys4ever.info
3313170.178.168.203 - inc.ww17.boys4ever.info
3314170.178.168.203 - info.ww17.boys4ever.info
3315170.178.168.203 - india.ww17.boys4ever.info
3316170.178.168.203 - indianapolis.ww17.boys4ever.info
3317170.178.168.203 - inside.ww17.boys4ever.info
3318170.178.168.203 - intern.ww17.boys4ever.info
3319170.178.168.203 - international.ww17.boys4ever.info
3320170.178.168.203 - intranet.ww17.boys4ever.info
3321170.178.168.203 - investor.ww17.boys4ever.info
3322170.178.168.203 - iota.ww17.boys4ever.info
3323170.178.168.203 - io.ww17.boys4ever.info
3324170.178.168.203 - iowa.ww17.boys4ever.info
3325170.178.168.203 - iplanet.ww17.boys4ever.info
3326170.178.168.203 - ipv6.ww17.boys4ever.info
3327170.178.168.203 - ipsec.ww17.boys4ever.info
3328170.178.168.203 - ipv6.teredo.ww17.boys4ever.info
3329170.178.168.203 - iris.ww17.boys4ever.info
3330170.178.168.203 - ircserver.ww17.boys4ever.info
3331170.178.168.203 - irvine.ww17.boys4ever.info
3332170.178.168.203 - isa.ww17.boys4ever.info
3333170.178.168.203 - isaserver.ww17.boys4ever.info
3334170.178.168.203 - isync.ww17.boys4ever.info
3335170.178.168.203 - isaserv.ww17.boys4ever.info
3336170.178.168.203 - ism.ww17.boys4ever.info
3337170.178.168.203 - it.ww17.boys4ever.info
3338170.178.168.203 - italy.ww17.boys4ever.info
3339170.178.168.203 - ix.ww17.boys4ever.info
3340170.178.168.203 - j.ww17.boys4ever.info
3341170.178.168.203 - jedi.ww17.boys4ever.info
3342170.178.168.203 - japan.ww17.boys4ever.info
3343170.178.168.203 - juliet.ww17.boys4ever.info
3344170.178.168.203 - jrun.ww17.boys4ever.info
3345170.178.168.203 - jp.ww17.boys4ever.info
3346170.178.168.203 - juliette.ww17.boys4ever.info
3347170.178.168.203 - juegos.ww17.boys4ever.info
3348170.178.168.203 - juniper.ww17.boys4ever.info
3349170.178.168.203 - kb.ww17.boys4ever.info
3350170.178.168.203 - keynote.ww17.boys4ever.info
3351170.178.168.203 - km.ww17.boys4ever.info
3352170.178.168.203 - kh.ww17.boys4ever.info
3353170.178.168.203 - kg.ww17.boys4ever.info
3354170.178.168.203 - knowledgebase.ww17.boys4ever.info
3355170.178.168.203 - koe.ww17.boys4ever.info
3356170.178.168.203 - knoxville.ww17.boys4ever.info
3357170.178.168.203 - ks.ww17.boys4ever.info
3358170.178.168.203 - kw.ww17.boys4ever.info
3359170.178.168.203 - ky.ww17.boys4ever.info
3360170.178.168.203 - lab.ww17.boys4ever.info
3361170.178.168.203 - kz.ww17.boys4ever.info
3362170.178.168.203 - la.ww17.boys4ever.info
3363170.178.168.203 - labs.ww17.boys4ever.info
3364170.178.168.203 - laboratory.ww17.boys4ever.info
3365170.178.168.203 - lan.ww17.boys4ever.info
3366170.178.168.203 - launch.ww17.boys4ever.info
3367170.178.168.203 - lb.ww17.boys4ever.info
3368170.178.168.203 - leo.ww17.boys4ever.info
3369170.178.168.203 - library.ww17.boys4ever.info
3370170.178.168.203 - lima.ww17.boys4ever.info
3371170.178.168.203 - lista.ww17.boys4ever.info
3372170.178.168.203 - linux1.ww17.boys4ever.info
3373170.178.168.203 - listserv.ww17.boys4ever.info
3374170.178.168.203 - lists.ww17.boys4ever.info
3375170.178.168.203 - listserver.ww17.boys4ever.info
3376170.178.168.203 - log.ww17.boys4ever.info
3377170.178.168.203 - localhost.ww17.boys4ever.info
3378170.178.168.203 - load.ww17.boys4ever.info
3379170.178.168.203 - lk.ww17.boys4ever.info
3380170.178.168.203 - log01.ww17.boys4ever.info
3381170.178.168.203 - log0.ww17.boys4ever.info
3382170.178.168.203 - log02.ww17.boys4ever.info
3383170.178.168.203 - logfiles.ww17.boys4ever.info
3384170.178.168.203 - log2.ww17.boys4ever.info
3385170.178.168.203 - lotus.ww17.boys4ever.info
3386170.178.168.203 - losangeles.ww17.boys4ever.info
3387170.178.168.203 - lr.ww17.boys4ever.info
3388170.178.168.203 - louisiana.ww17.boys4ever.info
3389170.178.168.203 - lt.ww17.boys4ever.info
3390170.178.168.203 - ly.ww17.boys4ever.info
3391170.178.168.203 - m.ww17.boys4ever.info
3392170.178.168.203 - mac1.ww17.boys4ever.info
3393170.178.168.203 - lyris.ww17.boys4ever.info
3394170.178.168.203 - mac10.ww17.boys4ever.info
3395170.178.168.203 - mail2.ww17.boys4ever.info
3396170.178.168.203 - mach.ww17.boys4ever.info
3397170.178.168.203 - madrid.ww17.boys4ever.info
3398170.178.168.203 - mailgate.ww17.boys4ever.info
3399170.178.168.203 - maillists.ww17.boys4ever.info
3400170.178.168.203 - mailserv.ww17.boys4ever.info
3401170.178.168.203 - mailing.ww17.boys4ever.info
3402170.178.168.203 - mailhost.ww17.boys4ever.info
3403170.178.168.203 - manage.ww17.boys4ever.info
3404170.178.168.203 - mailsite.ww17.boys4ever.info
3405170.178.168.203 - main.ww17.boys4ever.info
3406170.178.168.203 - mailsrv.ww17.boys4ever.info
3407170.178.168.203 - mall.ww17.boys4ever.info
3408170.178.168.203 - maine.ww17.boys4ever.info
3409170.178.168.203 - manufacturing.ww17.boys4ever.info
3410170.178.168.203 - manager.ww17.boys4ever.info
3411170.178.168.203 - map.ww17.boys4ever.info
3412170.178.168.203 - marketing.ww17.boys4ever.info
3413170.178.168.203 - mars.ww17.boys4ever.info
3414170.178.168.203 - mci.ww17.boys4ever.info
3415170.178.168.203 - mc.ww17.boys4ever.info
3416170.178.168.203 - me.ww17.boys4ever.info
3417170.178.168.203 - md.ww17.boys4ever.info
3418170.178.168.203 - memphis.ww17.boys4ever.info
3419170.178.168.203 - members.ww17.boys4ever.info
3420170.178.168.203 - mercury.ww17.boys4ever.info
3421170.178.168.203 - messenger.ww17.boys4ever.info
3422170.178.168.203 - messages.ww17.boys4ever.info
3423170.178.168.203 - mgmt.ww17.boys4ever.info
3424170.178.168.203 - midwest.ww17.boys4ever.info
3425170.178.168.203 - mi.ww17.boys4ever.info
3426170.178.168.203 - michigan.ww17.boys4ever.info
3427170.178.168.203 - mickey.ww17.boys4ever.info
3428170.178.168.203 - mike.ww17.boys4ever.info
3429170.178.168.203 - milwaukee.ww17.boys4ever.info
3430170.178.168.203 - minnesota.ww17.boys4ever.info
3431170.178.168.203 - minneapolis.ww17.boys4ever.info
3432170.178.168.203 - mis.ww17.boys4ever.info
3433170.178.168.203 - mk.ww17.boys4ever.info
3434170.178.168.203 - ml.ww17.boys4ever.info
3435170.178.168.203 - mobile.ww17.boys4ever.info
3436170.178.168.203 - mn.ww17.boys4ever.info
3437170.178.168.203 - monitoring.ww17.boys4ever.info
3438170.178.168.203 - mom.ww17.boys4ever.info
3439170.178.168.203 - moscow.ww17.boys4ever.info
3440170.178.168.203 - mp.ww17.boys4ever.info
3441170.178.168.203 - mpeg.ww17.boys4ever.info
3442170.178.168.203 - mp3.ww17.boys4ever.info
3443170.178.168.203 - ms.ww17.boys4ever.info
3444170.178.168.203 - ms-sql.ww17.boys4ever.info
3445170.178.168.203 - mssql0.ww17.boys4ever.info
3446170.178.168.203 - mssql01.ww17.boys4ever.info
3447170.178.168.203 - mt.ww17.boys4ever.info
3448170.178.168.203 - mta.ww17.boys4ever.info
3449170.178.168.203 - multimedia.ww17.boys4ever.info
3450170.178.168.203 - mx.ww17.boys4ever.info
3451170.178.168.203 - mw.ww17.boys4ever.info170.178.168.203 - music.ww17.boys4ever.info
3452
3453170.178.168.203 - my.ww17.boys4ever.info
3454170.178.168.203 - mysql.ww17.boys4ever.info
3455170.178.168.203 - mysql0.ww17.boys4ever.info
3456170.178.168.203 - mysql01.ww17.boys4ever.info
3457170.178.168.203 - mz.ww17.boys4ever.info
3458170.178.168.203 - mysql1.ww17.boys4ever.info
3459170.178.168.203 - nashville.ww17.boys4ever.info
3460170.178.168.203 - nat.ww17.boys4ever.info
3461170.178.168.203 - nd.ww17.boys4ever.info
3462170.178.168.203 - net.ww17.boys4ever.info
3463170.178.168.203 - netdata.ww17.boys4ever.info
3464170.178.168.203 - netapp.ww17.boys4ever.info
3465170.178.168.203 - nevada.ww17.boys4ever.info
3466170.178.168.203 - network.ww17.boys4ever.info
3467170.178.168.203 - netscreen.ww17.boys4ever.info
3468170.178.168.203 - newjersey.ww17.boys4ever.info
3469170.178.168.203 - newmexico.ww17.boys4ever.info
3470170.178.168.203 - newsfeed.ww17.boys4ever.info
3471170.178.168.203 - newton.ww17.boys4ever.info
3472170.178.168.203 - newzealand.ww17.boys4ever.info
3473170.178.168.203 - newyork.ww17.boys4ever.info
3474170.178.168.203 - nf.ww17.boys4ever.info
3475170.178.168.203 - nj.ww17.boys4ever.info
3476170.178.168.203 - nl.ww17.boys4ever.info
3477170.178.168.203 - nms.ww17.boys4ever.info
3478170.178.168.203 - node.ww17.boys4ever.info
3479170.178.168.203 - nokia.ww17.boys4ever.info
3480170.178.168.203 - northeast.ww17.boys4ever.info
3481170.178.168.203 - northwest.ww17.boys4ever.info
3482170.178.168.203 - northcarolina.ww17.boys4ever.info
3483170.178.168.203 - novell.ww17.boys4ever.info
3484170.178.168.203 - np.ww17.boys4ever.info
3485170.178.168.203 - ns01.ww17.boys4ever.info
3486170.178.168.203 - ns-.ww17.boys4ever.info
3487170.178.168.203 - ns2.ww17.boys4ever.info
3488170.178.168.203 - ns3.ww17.boys4ever.info
3489170.178.168.203 - ns5.ww17.boys4ever.info
3490170.178.168.203 - nt.ww17.boys4ever.info
3491170.178.168.203 - null.ww17.boys4ever.info
3492170.178.168.203 - nz.ww17.boys4ever.info
3493170.178.168.203 - nv.ww17.boys4ever.info
3494170.178.168.203 - ocean.ww17.boys4ever.info
3495170.178.168.203 - oakland.ww17.boys4ever.info
3496170.178.168.203 - oh.ww17.boys4ever.info
3497170.178.168.203 - old.ww17.boys4ever.info
3498170.178.168.203 - oklahoma.ww17.boys4ever.info
3499170.178.168.203 - om.ww17.boys4ever.info
3500170.178.168.203 - omicron.ww17.boys4ever.info
3501170.178.168.203 - ontario.ww17.boys4ever.info
3502170.178.168.203 - open.ww17.boys4ever.info
3503170.178.168.203 - openbsd.ww17.boys4ever.info
3504170.178.168.203 - openview.ww17.boys4ever.info
3505170.178.168.203 - ops01.ww17.boys4ever.info
3506170.178.168.203 - opsware.ww17.boys4ever.info
3507170.178.168.203 - ops02.ww17.boys4ever.info
3508170.178.168.203 - ops2.ww17.boys4ever.info
3509170.178.168.203 - ops1.ww17.boys4ever.info
3510170.178.168.203 - orange.ww17.boys4ever.info
3511170.178.168.203 - order.ww17.boys4ever.info
3512170.178.168.203 - out.ww17.boys4ever.info
3513170.178.168.203 - outgoing.ww17.boys4ever.info
3514170.178.168.203 - outlook.ww17.boys4ever.info
3515170.178.168.203 - owa02.ww17.boys4ever.info
3516170.178.168.203 - owa1.ww17.boys4ever.info
3517170.178.168.203 - owa2.ww17.boys4ever.info
3518170.178.168.203 - ows.ww17.boys4ever.info
3519170.178.168.203 - pa.ww17.boys4ever.info
3520170.178.168.203 - oxnard.ww17.boys4ever.info
3521170.178.168.203 - page.ww17.boys4ever.info
3522170.178.168.203 - pages.ww17.boys4ever.info
3523170.178.168.203 - paginas.ww17.boys4ever.info
3524170.178.168.203 - parners.ww17.boys4ever.info
3525170.178.168.203 - partners.ww17.boys4ever.info
3526170.178.168.203 - pbx.ww17.boys4ever.info
3527170.178.168.203 - pc.ww17.boys4ever.info
3528170.178.168.203 - pc01.ww17.boys4ever.info
3529170.178.168.203 - pc1.ww17.boys4ever.info
3530170.178.168.203 - pc10.ww17.boys4ever.info
3531170.178.168.203 - pc101.ww17.boys4ever.info
3532170.178.168.203 - pc11.ww17.boys4ever.info
3533170.178.168.203 - pc12.ww17.boys4ever.info
3534170.178.168.203 - pc16.ww17.boys4ever.info
3535170.178.168.203 - pc18.ww17.boys4ever.info
3536170.178.168.203 - pc23.ww17.boys4ever.info
3537170.178.168.203 - pc26.ww17.boys4ever.info
3538170.178.168.203 - pc28.ww17.boys4ever.info
3539170.178.168.203 - pc30.ww17.boys4ever.info
3540170.178.168.203 - pc32.ww17.boys4ever.info
3541170.178.168.203 - pc35.ww17.boys4ever.info
3542170.178.168.203 - pc34.ww17.boys4ever.info
3543170.178.168.203 - pc36.ww17.boys4ever.info
3544170.178.168.203 - pc42.ww17.boys4ever.info
3545170.178.168.203 - pc41.ww17.boys4ever.info
3546170.178.168.203 - pc46.ww17.boys4ever.info
3547170.178.168.203 - pc49.ww17.boys4ever.info
3548170.178.168.203 - pc50.ww17.boys4ever.info
3549170.178.168.203 - pc48.ww17.boys4ever.info
3550170.178.168.203 - pc53.ww17.boys4ever.info
3551170.178.168.203 - pc57.ww17.boys4ever.info
3552170.178.168.203 - pc55.ww17.boys4ever.info
3553170.178.168.203 - pc59.ww17.boys4ever.info
3554170.178.168.203 - pc6.ww17.boys4ever.info
3555170.178.168.203 - pc7.ww17.boys4ever.info
3556170.178.168.203 - pegasus.ww17.boys4ever.info
3557170.178.168.203 - personal.ww17.boys4ever.info
3558170.178.168.203 - peoplesoft.ww17.boys4ever.info
3559170.178.168.203 - philadelphia.ww17.boys4ever.info
3560170.178.168.203 - phi.ww17.boys4ever.info
3561170.178.168.203 - phoeniz.ww17.boys4ever.info
3562170.178.168.203 - phones.ww17.boys4ever.info
3563170.178.168.203 - photos.ww17.boys4ever.info
3564170.178.168.203 - pi.ww17.boys4ever.info
3565170.178.168.203 - pictures.ww17.boys4ever.info
3566170.178.168.203 - pics.ww17.boys4ever.info
3567170.178.168.203 - pix.ww17.boys4ever.info
3568170.178.168.203 - pipex-gw.ww17.boys4ever.info
3569170.178.168.203 - pink.ww17.boys4ever.info
3570170.178.168.203 - pki.ww17.boys4ever.info
3571170.178.168.203 - plano.ww17.boys4ever.info
3572170.178.168.203 - platinum.ww17.boys4ever.info
3573170.178.168.203 - pn.ww17.boys4ever.info
3574170.178.168.203 - po.ww17.boys4ever.info
3575170.178.168.203 - pop3.ww17.boys4ever.info
3576170.178.168.203 - portals.ww17.boys4ever.info
3577170.178.168.203 - portland.ww17.boys4ever.info
3578170.178.168.203 - postales.ww17.boys4ever.info
3579170.178.168.203 - ppp11.ww17.boys4ever.info
3580170.178.168.203 - ppp1.ww17.boys4ever.info
3581170.178.168.203 - ppp12.ww17.boys4ever.info
3582170.178.168.203 - ppp19.ww17.boys4ever.info
3583170.178.168.203 - ppp18.ww17.boys4ever.info
3584170.178.168.203 - ppp20.ww17.boys4ever.info
3585170.178.168.203 - ppp4.ww17.boys4ever.info
3586170.178.168.203 - ppp5.ww17.boys4ever.info
3587170.178.168.203 - ppp8.ww17.boys4ever.info
3588170.178.168.203 - prensa.ww17.boys4ever.info
3589170.178.168.203 - ppp9.ww17.boys4ever.info
3590170.178.168.203 - pptp.ww17.boys4ever.info
3591170.178.168.203 - printer.ww17.boys4ever.info
3592170.178.168.203 - printserv.ww17.boys4ever.info
3593170.178.168.203 - printserver.ww17.boys4ever.info
3594170.178.168.203 - priv.ww17.boys4ever.info
3595170.178.168.203 - project.ww17.boys4ever.info
3596170.178.168.203 - projects.ww17.boys4ever.info
3597170.178.168.203 - promo.ww17.boys4ever.info
3598170.178.168.203 - ps.ww17.boys4ever.info
3599170.178.168.203 - public.ww17.boys4ever.info
3600170.178.168.203 - pt.ww17.boys4ever.info
3601170.178.168.203 - psi.ww17.boys4ever.info
3602170.178.168.203 - purple.ww17.boys4ever.info
3603170.178.168.203 - qa.ww17.boys4ever.info
3604170.178.168.203 - r1.ww17.boys4ever.info
3605170.178.168.203 - ras.ww17.boys4ever.info
3606170.178.168.203 - raptor.ww17.boys4ever.info
3607170.178.168.203 - redhat.ww17.boys4ever.info
3608170.178.168.203 - ref.ww17.boys4ever.info
3609170.178.168.203 - recruiting.ww17.boys4ever.info
3610170.178.168.203 - red.ww17.boys4ever.info
3611170.178.168.203 - reference.ww17.boys4ever.info
3612170.178.168.203 - reg.ww17.boys4ever.info
3613170.178.168.203 - registry.ww17.boys4ever.info
3614170.178.168.203 - relay.ww17.boys4ever.info
3615170.178.168.203 - regs.ww17.boys4ever.info
3616170.178.168.203 - remote.ww17.boys4ever.info
3617170.178.168.203 - research.ww17.boys4ever.info
3618170.178.168.203 - resumenes.ww17.boys4ever.info
3619170.178.168.203 - reserved.ww17.boys4ever.info
3620170.178.168.203 - ri.ww17.boys4ever.info
3621170.178.168.203 - romeo.ww17.boys4ever.info
3622170.178.168.203 - root.ww17.boys4ever.info
3623170.178.168.203 - route.ww17.boys4ever.info
3624170.178.168.203 - router.ww17.boys4ever.info
3625170.178.168.203 - rs.ww17.boys4ever.info
3626170.178.168.203 - rtelnet.ww17.boys4ever.info
3627170.178.168.203 - rtr01.ww17.boys4ever.info
3628170.178.168.203 - ru.ww17.boys4ever.info
3629170.178.168.203 - rune.ww17.boys4ever.info
3630170.178.168.203 - s.ww17.boys4ever.info
3631170.178.168.203 - s1.ww17.boys4ever.info
3632170.178.168.203 - rwhois.ww17.boys4ever.info
3633170.178.168.203 - sac.ww17.boys4ever.info
3634170.178.168.203 - sa.ww17.boys4ever.info
3635170.178.168.203 - sadmin.ww17.boys4ever.info
3636170.178.168.203 - safe.ww17.boys4ever.info
3637170.178.168.203 - sanantonio.ww17.boys4ever.info
3638170.178.168.203 - saskatchewan.ww17.boys4ever.info
3639170.178.168.203 - sanjose.ww17.boys4ever.info
3640170.178.168.203 - sc.ww17.boys4ever.info
3641170.178.168.203 - sbs.ww17.boys4ever.info
3642170.178.168.203 - scanner.ww17.boys4ever.info
3643170.178.168.203 - schedules.ww17.boys4ever.info
3644170.178.168.203 - scotty.ww17.boys4ever.info
3645170.178.168.203 - sd.ww17.boys4ever.info
3646170.178.168.203 - seattle.ww17.boys4ever.info
3647170.178.168.203 - se.ww17.boys4ever.info
3648170.178.168.203 - secured.ww17.boys4ever.info
3649170.178.168.203 - seri.ww17.boys4ever.info
3650170.178.168.203 - security.ww17.boys4ever.info
3651170.178.168.203 - serv2.ww17.boys4ever.info
3652170.178.168.203 - serv.ww17.boys4ever.info
3653170.178.168.203 - sh.ww17.boys4ever.info
3654170.178.168.203 - servidor.ww17.boys4ever.info
3655170.178.168.203 - shared.ww17.boys4ever.info
3656170.178.168.203 - shareware.ww17.boys4ever.info
3657170.178.168.203 - shop.ww17.boys4ever.info
3658170.178.168.203 - shopping.ww17.boys4ever.info
3659170.178.168.203 - si.ww17.boys4ever.info
3660170.178.168.203 - shoppers.ww17.boys4ever.info
3661170.178.168.203 - sim.ww17.boys4ever.info
3662170.178.168.203 - signup.ww17.boys4ever.info
3663170.178.168.203 - sj.ww17.boys4ever.info
3664170.178.168.203 - sl.ww17.boys4ever.info
3665170.178.168.203 - slmail.ww17.boys4ever.info
3666170.178.168.203 - smc.ww17.boys4ever.info
3667170.178.168.203 - smtp.ww17.boys4ever.info
3668170.178.168.203 - snmpd.ww17.boys4ever.info
3669170.178.168.203 - snmp.ww17.boys4ever.info
3670170.178.168.203 - sn.ww17.boys4ever.info
3671170.178.168.203 - sniffer.ww17.boys4ever.info
3672170.178.168.203 - so.ww17.boys4ever.info
3673170.178.168.203 - software.ww17.boys4ever.info
3674170.178.168.203 - sol.ww17.boys4ever.info
3675170.178.168.203 - sourcesafe.ww17.boys4ever.info
3676170.178.168.203 - southcarolina.ww17.boys4ever.info
3677170.178.168.203 - southeast.ww17.boys4ever.info
3678170.178.168.203 - spain.ww17.boys4ever.info
3679170.178.168.203 - southwest.ww17.boys4ever.info
3680170.178.168.203 - spam.ww17.boys4ever.info
3681170.178.168.203 - spock.ww17.boys4ever.info
3682170.178.168.203 - spiderman.ww17.boys4ever.info
3683170.178.168.203 - spokane.ww17.boys4ever.info
3684170.178.168.203 - sprint.ww17.boys4ever.info
3685170.178.168.203 - sqa.ww17.boys4ever.info
3686170.178.168.203 - sql0.ww17.boys4ever.info
3687170.178.168.203 - sql1.ww17.boys4ever.info
3688170.178.168.203 - ssh.ww17.boys4ever.info
3689170.178.168.203 - ss.ww17.boys4ever.info
3690170.178.168.203 - ssl1.ww17.boys4ever.info
3691170.178.168.203 - st.ww17.boys4ever.info
3692170.178.168.203 - staff.ww17.boys4ever.info
3693170.178.168.203 - start.ww17.boys4ever.info
3694170.178.168.203 - static.ww17.boys4ever.info
3695170.178.168.203 - stats.ww17.boys4ever.info
3696170.178.168.203 - stlouis.ww17.boys4ever.info
3697170.178.168.203 - statistics.ww17.boys4ever.info
3698170.178.168.203 - stock.ww17.boys4ever.info
3699170.178.168.203 - storage.ww17.boys4ever.info
3700170.178.168.203 - store.ww17.boys4ever.info
3701170.178.168.203 - storefront.ww17.boys4ever.info
3702170.178.168.203 - streaming.ww17.boys4ever.info
3703170.178.168.203 - studio.ww17.boys4ever.info
3704170.178.168.203 - strongmail.ww17.boys4ever.info
3705170.178.168.203 - submit.ww17.boys4ever.info
3706170.178.168.203 - sun0.ww17.boys4ever.info
3707170.178.168.203 - sun.ww17.boys4ever.info
3708170.178.168.203 - sun2.ww17.boys4ever.info
3709170.178.168.203 - superman.ww17.boys4ever.info
3710170.178.168.203 - supplier.ww17.boys4ever.info
3711170.178.168.203 - support.ww17.boys4ever.info
3712170.178.168.203 - sv.ww17.boys4ever.info
3713170.178.168.203 - sw.ww17.boys4ever.info
3714170.178.168.203 - sw01.ww17.boys4ever.info
3715170.178.168.203 - sw0.ww17.boys4ever.info
3716170.178.168.203 - switch.ww17.boys4ever.info
3717170.178.168.203 - sybase.ww17.boys4ever.info
3718170.178.168.203 - sy.ww17.boys4ever.info
3719170.178.168.203 - sysadmin.ww17.boys4ever.info
3720170.178.168.203 - sysback.ww17.boys4ever.info
3721170.178.168.203 - taiwan.ww17.boys4ever.info
3722170.178.168.203 - tacoma.ww17.boys4ever.info
3723170.178.168.203 - tampa.ww17.boys4ever.info
3724170.178.168.203 - tc.ww17.boys4ever.info
3725170.178.168.203 - tcl.ww17.boys4ever.info
3726170.178.168.203 - team.ww17.boys4ever.info
3727170.178.168.203 - td.ww17.boys4ever.info
3728170.178.168.203 - tech.ww17.boys4ever.info
3729170.178.168.203 - telephone.ww17.boys4ever.info
3730170.178.168.203 - tennessee.ww17.boys4ever.info
3731170.178.168.203 - terminal.ww17.boys4ever.info
3732170.178.168.203 - test.ww17.boys4ever.info
3733170.178.168.203 - termserv.ww17.boys4ever.info
3734170.178.168.203 - testajax.ww17.boys4ever.info
3735170.178.168.203 - testcf.ww17.boys4ever.info
3736170.178.168.203 - testlab.ww17.boys4ever.info
3737170.178.168.203 - testphp.ww17.boys4ever.info
3738170.178.168.203 - testserver.ww17.boys4ever.info
3739170.178.168.203 - testsite.ww17.boys4ever.info
3740170.178.168.203 - testxp.ww17.boys4ever.info
3741170.178.168.203 - texas.ww17.boys4ever.info
3742170.178.168.203 - thailand.ww17.boys4ever.info
3743170.178.168.203 - tienda.ww17.boys4ever.info
3744170.178.168.203 - tm.ww17.boys4ever.info
3745170.178.168.203 - tokyo.ww17.boys4ever.info
3746170.178.168.203 - tom.ww17.boys4ever.info
3747170.178.168.203 - tn.ww17.boys4ever.info
3748170.178.168.203 - train.ww17.boys4ever.info
3749170.178.168.203 - training.ww17.boys4ever.info
3750170.178.168.203 - ts.ww17.boys4ever.info
3751170.178.168.203 - ts1.ww17.boys4ever.info
3752170.178.168.203 - tucson.ww17.boys4ever.info
3753170.178.168.203 - trinidad.ww17.boys4ever.info
3754170.178.168.203 - tulsa.ww17.boys4ever.info
3755170.178.168.203 - tx.ww17.boys4ever.info170.178.168.203 - tw.ww17.boys4ever.info
3756
3757170.178.168.203 - uniform.ww17.boys4ever.info
3758170.178.168.203 - upload.ww17.boys4ever.info
3759170.178.168.203 - updates.ww17.boys4ever.info
3760170.178.168.203 - upsilon.ww17.boys4ever.info
3761170.178.168.203 - urchin.ww17.boys4ever.info
3762170.178.168.203 - us.ww17.boys4ever.info
3763170.178.168.203 - usa.ww17.boys4ever.info
3764170.178.168.203 - usenet.ww17.boys4ever.info
3765170.178.168.203 - utah.ww17.boys4ever.info
3766170.178.168.203 - utilities.ww17.boys4ever.info
3767170.178.168.203 - users.ww17.boys4ever.info
3768170.178.168.203 - uy.ww17.boys4ever.info
3769170.178.168.203 - vault.ww17.boys4ever.info
3770170.178.168.203 - va.ww17.boys4ever.info
3771170.178.168.203 - v6.ww17.boys4ever.info
3772170.178.168.203 - vantive.ww17.boys4ever.info
3773170.178.168.203 - vega.ww17.boys4ever.info
3774170.178.168.203 - ve.ww17.boys4ever.info
3775170.178.168.203 - venus.ww17.boys4ever.info
3776170.178.168.203 - vend.ww17.boys4ever.info
3777170.178.168.203 - vermont.ww17.boys4ever.info
3778170.178.168.203 - violet.ww17.boys4ever.info
3779170.178.168.203 - viking.ww17.boys4ever.info
3780170.178.168.203 - videos.ww17.boys4ever.info
3781170.178.168.203 - vip.ww17.boys4ever.info
3782170.178.168.203 - vmware.ww17.boys4ever.info
3783170.178.168.203 - vn.ww17.boys4ever.info
3784170.178.168.203 - vpn.ww17.boys4ever.info
3785170.178.168.203 - voyager.ww17.boys4ever.info
3786170.178.168.203 - vpn1.ww17.boys4ever.info
3787170.178.168.203 - vpn0.ww17.boys4ever.info
3788170.178.168.203 - vpn02.ww17.boys4ever.info
3789170.178.168.203 - vpn01.ww17.boys4ever.info
3790170.178.168.203 - vt.ww17.boys4ever.info
3791170.178.168.203 - w.ww17.boys4ever.info
3792170.178.168.203 - wa.ww17.boys4ever.info
3793170.178.168.203 - w2.ww17.boys4ever.info
3794170.178.168.203 - w3.ww17.boys4ever.info
3795170.178.168.203 - w1.ww17.boys4ever.info
3796170.178.168.203 - wais.ww17.boys4ever.info
3797170.178.168.203 - warehouse.ww17.boys4ever.info
3798170.178.168.203 - wc3.ww17.boys4ever.info
3799170.178.168.203 - webcam.ww17.boys4ever.info
3800170.178.168.203 - webboard.ww17.boys4ever.info
3801170.178.168.203 - webfarm.ww17.boys4ever.info
3802170.178.168.203 - webhelp.ww17.boys4ever.info
3803170.178.168.203 - webproxy.ww17.boys4ever.info
3804170.178.168.203 - webmaster.ww17.boys4ever.info
3805170.178.168.203 - weblib.ww17.boys4ever.info
3806170.178.168.203 - webs.ww17.boys4ever.info
3807170.178.168.203 - website.ww17.boys4ever.info
3808170.178.168.203 - websphere.ww17.boys4ever.info
3809170.178.168.203 - websvr.ww17.boys4ever.info
3810170.178.168.203 - webtrends.ww17.boys4ever.info
3811170.178.168.203 - welcome.ww17.boys4ever.info
3812170.178.168.203 - westvirginia.ww17.boys4ever.info
3813170.178.168.203 - whois.ww17.boys4ever.info
3814170.178.168.203 - wiki.ww17.boys4ever.info
3815170.178.168.203 - wf.ww17.boys4ever.info
3816170.178.168.203 - white.ww17.boys4ever.info
3817170.178.168.203 - win1.ww17.boys4ever.info
3818170.178.168.203 - win.ww17.boys4ever.info
3819170.178.168.203 - windows2.ww17.boys4ever.info
3820170.178.168.203 - windows1.ww17.boys4ever.info
3821170.178.168.203 - win2k3.ww17.boys4ever.info
3822170.178.168.203 - windows02.ww17.boys4ever.info170.178.168.203 - windows01.ww17.boys4ever.info
3823
3824170.178.168.203 - wingate.ww17.boys4ever.info
3825170.178.168.203 - windows2003.ww17.boys4ever.info
3826170.178.168.203 - winproxy.ww17.boys4ever.info
3827170.178.168.203 - wins.ww17.boys4ever.info
3828170.178.168.203 - wire.ww17.boys4ever.info
3829170.178.168.203 - wordpress.ww17.boys4ever.info
3830170.178.168.203 - wisconsin.ww17.boys4ever.info
3831170.178.168.203 - world.ww17.boys4ever.info
3832170.178.168.203 - wlan.ww17.boys4ever.info
3833170.178.168.203 - ws10.ww17.boys4ever.info
3834170.178.168.203 - ws12.ww17.boys4ever.info
3835170.178.168.203 - ws13.ww17.boys4ever.info
3836170.178.168.203 - ws2.ww17.boys4ever.info
3837170.178.168.203 - wusage.ww17.boys4ever.info
3838170.178.168.203 - ws4.ww17.boys4ever.info
3839170.178.168.203 - wv.ww17.boys4ever.info
3840170.178.168.203 - ws5.ww17.boys4ever.info
3841170.178.168.203 - www.ww17.boys4ever.info
3842170.178.168.203 - ww.ww17.boys4ever.info
3843170.178.168.203 - www-01.ww17.boys4ever.info
3844170.178.168.203 - www-.ww17.boys4ever.info
3845170.178.168.203 - www0.ww17.boys4ever.info
3846170.178.168.203 - www01.ww17.boys4ever.info
3847170.178.168.203 - www02.ww17.boys4ever.info
3848170.178.168.203 - www3.ww17.boys4ever.info
3849170.178.168.203 - www1.ww17.boys4ever.info
3850170.178.168.203 - wwwchat.ww17.boys4ever.info
3851170.178.168.203 - wwwmail.ww17.boys4ever.info
3852170.178.168.203 - wyoming.ww17.boys4ever.info
3853170.178.168.203 - xlogan.ww17.boys4ever.info
3854170.178.168.203 - xml.ww17.boys4ever.info
3855170.178.168.203 - y.ww17.boys4ever.info
3856170.178.168.203 - young.ww17.boys4ever.info
3857170.178.168.203 - z.ww17.boys4ever.info
3858170.178.168.203 - z-log.ww17.boys4ever.info
3859170.178.168.203 - zebra.ww17.boys4ever.info
3860170.178.168.203 - zulu.ww17.boys4ever.info
3861170.178.168.203 - zw.ww17.boys4ever.info
3862###################################################################################################################################
386301.ww17.boys4ever.info170.178.168.203
386402.ww17.boys4ever.info
386503.ww17.boys4ever.info
386612.ww17.boys4ever.info
386713.ww17.boys4ever.info
386815.ww17.boys4ever.info
386916.ww17.boys4ever.info
387017.ww17.boys4ever.info
387118.ww17.boys4ever.info
387219.ww17.boys4ever.info
387320.ww17.boys4ever.info
38743.ww17.boys4ever.info
38755.ww17.boys4ever.info
38766.ww17.boys4ever.info
3877a01.ww17.boys4ever.info
3878a1.ww17.boys4ever.info
3879a2.ww17.boys4ever.info
3880abc.ww17.boys4ever.info
3881acceso.ww17.boys4ever.info
3882accounting.ww17.boys4ever.info
3883ac.ww17.boys4ever.info
3884adkit.ww17.boys4ever.info
3885administrador.ww17.boys4ever.info
3886administrators.ww17.boys4ever.info
3887administrator.ww17.boys4ever.info
3888admins.ww17.boys4ever.info
3889adsl.ww17.boys4ever.info
3890ad.ww17.boys4ever.info
3891af.ww17.boys4ever.info
3892aix.ww17.boys4ever.info
3893alaska.ww17.boys4ever.info
3894alerts.ww17.boys4ever.info
3895alpha.ww17.boys4ever.info
3896alterwind.ww17.boys4ever.info
3897am.ww17.boys4ever.info
3898anaheim.ww17.boys4ever.info
3899announcements.ww17.boys4ever.info
3900announce.ww17.boys4ever.info
3901antivirus.ww17.boys4ever.info
3902apache.ww17.boys4ever.info
3903apollo.ww17.boys4ever.info
3904app01.ww17.boys4ever.info
3905application.ww17.boys4ever.info170.178.168.203
3906apps.ww17.boys4ever.info
3907aq.ww17.boys4ever.info
3908archie.ww17.boys4ever.info
3909asia.ww17.boys4ever.info
3910asterix.ww17.boys4ever.info
3911as.ww17.boys4ever.info
3912athena.ww17.boys4ever.info
3913atlanta.ww17.boys4ever.info
3914att.ww17.boys4ever.info
3915at.ww17.boys4ever.info
3916auction.ww17.boys4ever.info170.178.168.203
3917auth.ww17.boys4ever.info
3918auto.ww17.boys4ever.info
3919au.ww17.boys4ever.info
3920av.ww17.boys4ever.info
3921a.ww17.boys4ever.info
3922aw.ww17.boys4ever.info
3923ayuda.ww17.boys4ever.info
3924b01.ww17.boys4ever.info
3925b2b.ww17.boys4ever.info
3926b2c.ww17.boys4ever.info
3927backend.ww17.boys4ever.info
3928backup.ww17.boys4ever.info
3929back.ww17.boys4ever.info
3930bakersfield.ww17.boys4ever.info
3931balancer.ww17.boys4ever.info
3932baltimore.ww17.boys4ever.info
3933banking.ww17.boys4ever.info
3934b.auth-ns.ww17.boys4ever.info
3935ba.ww17.boys4ever.info
3936bayarea.ww17.boys4ever.info
3937bbdd.ww17.boys4ever.info
3938bb.ww17.boys4ever.info
3939bd.ww17.boys4ever.info
3940be.ww17.boys4ever.info
3941blackberry.ww17.boys4ever.info
3942black.ww17.boys4ever.info
3943blog.ww17.boys4ever.info
3944bm.ww17.boys4ever.info
3945bn.ww17.boys4ever.info
3946boise.ww17.boys4ever.info
3947bolsa.ww17.boys4ever.info
3948boston.ww17.boys4ever.info
3949brazil.ww17.boys4ever.info
3950broadcast.ww17.boys4ever.info
3951bronze.ww17.boys4ever.info
3952brown.ww17.boys4ever.info
3953bsd2.ww17.boys4ever.info
3954bsd.ww17.boys4ever.info
3955bs.ww17.boys4ever.info
3956buscador.ww17.boys4ever.info
3957buy.ww17.boys4ever.info
3958bv.ww17.boys4ever.info
3959b.ww17.boys4ever.info
3960bw.ww17.boys4ever.info
3961by.ww17.boys4ever.info
3962bz.ww17.boys4ever.info
3963cache.ww17.boys4ever.info
3964cafe.ww17.boys4ever.info
3965call.ww17.boys4ever.info
3966calvin.ww17.boys4ever.info
3967canada.ww17.boys4ever.info
3968canal.ww17.boys4ever.info
3969canon.ww17.boys4ever.info
3970careers.ww17.boys4ever.info
3971catalog.ww17.boys4ever.info
3972c.auth-ns.ww17.boys4ever.info
3973cc.ww17.boys4ever.info
3974certify.ww17.boys4ever.info
3975cert.ww17.boys4ever.info
3976cf.ww17.boys4ever.info170.178.168.203
3977channel.ww17.boys4ever.info
3978charlie.ww17.boys4ever.info
3979chats.ww17.boys4ever.info
3980chicago.ww17.boys4ever.info
3981ch.ww17.boys4ever.info
3982cincinnati.ww17.boys4ever.info
3983cisco.ww17.boys4ever.info
3984citrix.ww17.boys4ever.info
3985ci.ww17.boys4ever.info
3986classifieds.ww17.boys4ever.info
3987cleveland.ww17.boys4ever.info
3988clicktrack.ww17.boys4ever.info
3989clientes.ww17.boys4ever.info
3990clients.ww17.boys4ever.info
3991client.ww17.boys4ever.info
3992clubs.ww17.boys4ever.info
3993club.ww17.boys4ever.info
3994clusters.ww17.boys4ever.info
3995cl.ww17.boys4ever.info
3996cms.ww17.boys4ever.info
3997cm.ww17.boys4ever.info
3998cn.ww17.boys4ever.info
3999cocoa.ww17.boys4ever.info
4000code.ww17.boys4ever.info
4001colombus.ww17.boys4ever.info
4002columbus.ww17.boys4ever.info
4003commerceserver.ww17.boys4ever.info
4004communigate.ww17.boys4ever.info
4005community.ww17.boys4ever.info
4006concentrator.ww17.boys4ever.info
4007confidential.ww17.boys4ever.info
4008conf.ww17.boys4ever.info
4009consola.ww17.boys4ever.info
4010consultant.ww17.boys4ever.info
4011contact.ww17.boys4ever.info
4012contracts.ww17.boys4ever.info
4013core01.ww17.boys4ever.info
4014core.ww17.boys4ever.info
4015correo.ww17.boys4ever.info
4016counterstrike.ww17.boys4ever.info
4017co.ww17.boys4ever.info
4018cricket.ww17.boys4ever.info
4019crs.ww17.boys4ever.info
4020cr.ww17.boys4ever.info
4021cso.ww17.boys4ever.info170.178.168.203
4022ct.ww17.boys4ever.info
4023cust101.ww17.boys4ever.info
4024cust102.ww17.boys4ever.info
4025cust103.ww17.boys4ever.info
4026cust106.ww17.boys4ever.info
4027cust108.ww17.boys4ever.info
4028cust109.ww17.boys4ever.info
4029cust110.ww17.boys4ever.info
4030cust114.ww17.boys4ever.info
4031cust115.ww17.boys4ever.info
4032cust117.ww17.boys4ever.info
4033cust119.ww17.boys4ever.info
4034cust11.ww17.boys4ever.info
4035cust121.ww17.boys4ever.info
4036cust122.ww17.boys4ever.info
4037cust124.ww17.boys4ever.info
4038cust125.ww17.boys4ever.info
4039cust126.ww17.boys4ever.info
4040cust12.ww17.boys4ever.info
4041cust14.ww17.boys4ever.info
4042cust18.ww17.boys4ever.info
4043cust22.ww17.boys4ever.info
4044cust26.ww17.boys4ever.info
4045cust2.ww17.boys4ever.info
4046cust31.ww17.boys4ever.info
4047cust33.ww17.boys4ever.info
4048cust34.ww17.boys4ever.info
4049cust36.ww17.boys4ever.info
4050cust38.ww17.boys4ever.info
4051cust39.ww17.boys4ever.info
4052cust40.ww17.boys4ever.info
4053cust43.ww17.boys4ever.info
4054cust48.ww17.boys4ever.info
4055cust49.ww17.boys4ever.info
4056cust51.ww17.boys4ever.info
4057cust53.ww17.boys4ever.info
4058cust54.ww17.boys4ever.info170.178.168.203
4059cust55.ww17.boys4ever.info
4060cust57.ww17.boys4ever.info
4061cust58.ww17.boys4ever.info
4062cust5.ww17.boys4ever.info
4063cust60.ww17.boys4ever.info
4064cust65.ww17.boys4ever.info
4065cust66.ww17.boys4ever.info
4066cust67.ww17.boys4ever.info
4067cust69.ww17.boys4ever.info
4068cust75.ww17.boys4ever.info
4069cust78.ww17.boys4ever.info
4070cust7.ww17.boys4ever.info
4071cust80.ww17.boys4ever.info
4072cust81.ww17.boys4ever.info
4073cust83.ww17.boys4ever.info
4074cust84.ww17.boys4ever.info170.178.168.203
4075cust85.ww17.boys4ever.info
4076cust86.ww17.boys4ever.info
4077cust87.ww17.boys4ever.info
4078cust89.ww17.boys4ever.info
4079cust8.ww17.boys4ever.info
4080cust91.ww17.boys4ever.info
4081cust92.ww17.boys4ever.info
4082cust93.ww17.boys4ever.info
4083cust96.ww17.boys4ever.info
4084cust97.ww17.boys4ever.info170.178.168.203
4085cust98.ww17.boys4ever.info
4086cu.ww17.boys4ever.info
4087cvs.ww17.boys4ever.info
4088cx.ww17.boys4ever.info170.178.168.203
4089cz.ww17.boys4ever.info
4090dallas.ww17.boys4ever.info
4091database02.ww17.boys4ever.info
4092database1.ww17.boys4ever.info
4093databases.ww17.boys4ever.info
4094datastore.ww17.boys4ever.info
4095db02.ww17.boys4ever.info
4096db1.ww17.boys4ever.info
4097db2.ww17.boys4ever.info
4098db.ww17.boys4ever.info
4099dell.ww17.boys4ever.info
4100delta1.ww17.boys4ever.info
4101delta.ww17.boys4ever.info
4102demonstration.ww17.boys4ever.info
4103denver.ww17.boys4ever.info
4104desarrollo.ww17.boys4ever.info
4105designer.ww17.boys4ever.info170.178.168.203
4106develop.ww17.boys4ever.info
4107device.ww17.boys4ever.info
4108devserver.ww17.boys4ever.info
4109devsql.ww17.boys4ever.info
4110dhcp.ww17.boys4ever.info
4111digital.ww17.boys4ever.info
4112dilbert.ww17.boys4ever.info
4113directory.ww17.boys4ever.info
4114dir.ww17.boys4ever.info
4115discussions.ww17.boys4ever.info
4116discuss.ww17.boys4ever.info
4117disc.ww17.boys4ever.info
4118disk.ww17.boys4ever.info
4119disney.ww17.boys4ever.info
4120distributers.ww17.boys4ever.info
4121distributer.ww17.boys4ever.info
4122dj.ww17.boys4ever.info
4123dk.ww17.boys4ever.info
4124dnews.ww17.boys4ever.info
4125dns2.ww17.boys4ever.info
4126dns.ww17.boys4ever.info
4127docs.ww17.boys4ever.info
4128documentacion.ww17.boys4ever.info
4129domain
4130domains.ww17.boys4ever.info
4131dominio.ww17.boys4ever.info
4132dominoweb.ww17.boys4ever.info
4133downloads.ww17.boys4ever.info
4134download.ww17.boys4ever.info
4135downtown.ww17.boys4ever.info
4136drupal.ww17.boys4ever.info
4137dynip.ww17.boys4ever.info
4138dyn.ww17.boys4ever.info
4139dz.ww17.boys4ever.info
4140eagle.ww17.boys4ever.info
4141earth.ww17.boys4ever.info
4142east.ww17.boys4ever.info
4143e-commerce.ww17.boys4ever.info
4144e-com.ww17.boys4ever.info
4145ecom.ww17.boys4ever.info
4146education.ww17.boys4ever.info
4147edu.ww17.boys4ever.info
4148ee.ww17.boys4ever.info
4149ejemplo.ww17.boys4ever.info
4150empresa.ww17.boys4ever.info
4151enable.ww17.boys4ever.info
4152eng1.ww17.boys4ever.info
4153engineer.ww17.boys4ever.info
4154engine.ww17.boys4ever.info170.178.168.203
4155eng.ww17.boys4ever.info
4156en.ww17.boys4ever.info
4157espanol.ww17.boys4ever.info
4158es.ww17.boys4ever.info
4159esx.ww17.boys4ever.info
4160eta.ww17.boys4ever.info
4161europe.ww17.boys4ever.info
4162e.ww17.boys4ever.info
4163exec.ww17.boys4ever.info
4164f5.ww17.boys4ever.info
4165farm.ww17.boys4ever.info
4166faststats.ww17.boys4ever.info
4167filestore.ww17.boys4ever.info
4168filter.ww17.boys4ever.info
4169finger.ww17.boys4ever.info
4170fi.ww17.boys4ever.info
4171fixes.ww17.boys4ever.info
4172fix.ww17.boys4ever.info
4173fj.ww17.boys4ever.info
4174flash.ww17.boys4ever.info
4175flow.ww17.boys4ever.info
4176fl.ww17.boys4ever.info
4177fm.ww17.boys4ever.info
4178foobar.ww17.boys4ever.info
4179forums.ww17.boys4ever.info
4180fotos.ww17.boys4ever.info
4181foundry.ww17.boys4ever.info
4182fox.ww17.boys4ever.info
4183france.ww17.boys4ever.info
4184fred.ww17.boys4ever.info
4185freebsd01.ww17.boys4ever.info
4186freebsd1.ww17.boys4ever.info
4187freebsd2.ww17.boys4ever.info
4188freeware.ww17.boys4ever.info
4189frontdesk.ww17.boys4ever.info
4190front.ww17.boys4ever.info
4191fr.ww17.boys4ever.info
4192ftp-.ww17.boys4ever.info
4193ftp.ww17.boys4ever.info
4194fw-1.ww17.boys4ever.info
4195fw1.ww17.boys4ever.info
4196fwsm01.ww17.boys4ever.info
4197galerias.ww17.boys4ever.info
4198galeria.ww17.boys4ever.info
4199gandalf.ww17.boys4ever.info
4200gatekeeper.ww17.boys4ever.info
4201gateway.ww17.boys4ever.info
4202gate.ww17.boys4ever.info
4203gd.ww17.boys4ever.info
4204gemini.ww17.boys4ever.info
4205general.ww17.boys4ever.info170.178.168.203
4206georgia.ww17.boys4ever.info
4207germany.ww17.boys4ever.info
4208gf.ww17.boys4ever.info
4209glendale.ww17.boys4ever.info
4210gm.ww17.boys4ever.info
4211golf.ww17.boys4ever.info
4212gp.ww17.boys4ever.info170.178.168.203
4213green.ww17.boys4ever.info
4214guest.ww17.boys4ever.info
4215gu.ww17.boys4ever.info
4216gw.ww17.boys4ever.info
4217gy.ww17.boys4ever.info
4218halflife.ww17.boys4ever.info
4219hawaii.ww17.boys4ever.info
4220hello.ww17.boys4ever.info
4221helpdesk.ww17.boys4ever.info
4222helponline.ww17.boys4ever.info
4223help.ww17.boys4ever.info
4224hermes.ww17.boys4ever.info
4225hi.ww17.boys4ever.info
4226hm.ww17.boys4ever.info
4227hn.ww17.boys4ever.info
4228hobbes.ww17.boys4ever.info
4229homebase.ww17.boys4ever.info
4230honeypot.ww17.boys4ever.info
4231honolulu.ww17.boys4ever.info
4232host1.ww17.boys4ever.info
4233host.ww17.boys4ever.info
4234hotjobs.ww17.boys4ever.info170.178.168.203
4235houstin.ww17.boys4ever.info
4236hr.ww17.boys4ever.info
4237http.ww17.boys4ever.info
4238ht.ww17.boys4ever.info
4239hu.ww17.boys4ever.info170.178.168.203
4240h.ww17.boys4ever.info
4241ias.ww17.boys4ever.info
4242ia.ww17.boys4ever.info
4243ida.ww17.boys4ever.info
4244images.ww17.boys4ever.info
4245imail.ww17.boys4ever.info
4246imap.ww17.boys4ever.info
4247img02.ww17.boys4ever.info
4248img0.ww17.boys4ever.info
4249im.ww17.boys4ever.info
4250inc.ww17.boys4ever.info
4251indianapolis.ww17.boys4ever.info
4252india.ww17.boys4ever.info
4253info.ww17.boys4ever.info
4254inside.ww17.boys4ever.info
4255international.ww17.boys4ever.info
4256intern.ww17.boys4ever.info
4257intranet.ww17.boys4ever.info
4258investor.ww17.boys4ever.info
4259in.ww17.boys4ever.info
4260iota.ww17.boys4ever.info
4261iowa.ww17.boys4ever.info
4262io.ww17.boys4ever.info
4263iplanet.ww17.boys4ever.info
4264ipsec.ww17.boys4ever.info
4265ipv6.teredo.ww17.boys4ever.info
4266ipv6.ww17.boys4ever.info
4267ircserver.ww17.boys4ever.info
4268iris.ww17.boys4ever.info
4269irvine.ww17.boys4ever.info
4270isaserver.ww17.boys4ever.info
4271isaserv.ww17.boys4ever.info
4272isa.ww17.boys4ever.info
4273ism.ww17.boys4ever.info
4274isync.ww17.boys4ever.info
4275italy.ww17.boys4ever.info
4276it.ww17.boys4ever.info
4277ix.ww17.boys4ever.info
4278jedi.ww17.boys4ever.info170.178.168.203
4279jp.ww17.boys4ever.info
4280jrun.ww17.boys4ever.info
4281juegos.ww17.boys4ever.info
4282juliette.ww17.boys4ever.info
4283juliet.ww17.boys4ever.info
4284juniper.ww17.boys4ever.info
4285j.ww17.boys4ever.info
4286kb.ww17.boys4ever.info
4287keynote.ww17.boys4ever.info
4288kg.ww17.boys4ever.info
4289kh.ww17.boys4ever.info
4290km.ww17.boys4ever.info
4291knowledgebase.ww17.boys4ever.info
4292knoxville.ww17.boys4ever.info
4293koe.ww17.boys4ever.info
4294ks.ww17.boys4ever.info
4295kw.ww17.boys4ever.info
4296ky.ww17.boys4ever.info
4297kz.ww17.boys4ever.info
4298laboratory.ww17.boys4ever.info
4299labs.ww17.boys4ever.info
4300lab.ww17.boys4ever.info
4301lan.ww17.boys4ever.info
4302launch.ww17.boys4ever.info
4303la.ww17.boys4ever.info
4304lb.ww17.boys4ever.info
4305leo.ww17.boys4ever.info
4306library.ww17.boys4ever.info
4307lima.ww17.boys4ever.info
4308linux1.ww17.boys4ever.info170.178.168.203
4309listserver.ww17.boys4ever.info
4310listserv.ww17.boys4ever.info
4311lists.ww17.boys4ever.info
4312lk.ww17.boys4ever.info
4313load.ww17.boys4ever.info
4314localhost.ww17.boys4ever.info
4315log01.ww17.boys4ever.info
4316log02.ww17.boys4ever.info
4317log0.ww17.boys4ever.info
4318log2.ww17.boys4ever.info
4319logfiles.ww17.boys4ever.info
4320log.ww17.boys4ever.info
4321losangeles.ww17.boys4ever.info
4322lotus.ww17.boys4ever.info
4323louisiana.ww17.boys4ever.info
4324lr.ww17.boys4ever.info
4325lt.ww17.boys4ever.info
4326lyris.ww17.boys4ever.info
4327ly.ww17.boys4ever.info
4328mac10.ww17.boys4ever.info
4329mac1.ww17.boys4ever.info
4330mach.ww17.boys4ever.info
4331madrid.ww17.boys4ever.info
4332mail2.ww17.boys4ever.info
4333mailgate.ww17.boys4ever.info
4334mailhost.ww17.boys4ever.info170.178.168.203
4335maillists.ww17.boys4ever.info
4336mailserv.ww17.boys4ever.info
4337mailsite.ww17.boys4ever.info
4338mailsrv.ww17.boys4ever.info
4339maine.ww17.boys4ever.info
4340main.ww17.boys4ever.info
4341mall.ww17.boys4ever.info
4342manager.ww17.boys4ever.info
4343manage.ww17.boys4ever.info
4344manufacturing.ww17.boys4ever.info
4345map.ww17.boys4ever.info
4346marketing.ww17.boys4ever.info
4347mars.ww17.boys4ever.info
4348mci.ww17.boys4ever.info
4349mc.ww17.boys4ever.info
4350md.ww17.boys4ever.info
4351members.ww17.boys4ever.info
4352memphis.ww17.boys4ever.info
4353mercury.ww17.boys4ever.info
4354messenger.ww17.boys4ever.info170.178.168.203
4355me.ww17.boys4ever.info
4356mgmt.ww17.boys4ever.info
4357michigan.ww17.boys4ever.info
4358mickey.ww17.boys4ever.info
4359midwest.ww17.boys4ever.info
4360mike.ww17.boys4ever.info
4361milwaukee.ww17.boys4ever.info
4362minneapolis.ww17.boys4ever.info
4363minnesota.ww17.boys4ever.info
4364mis.ww17.boys4ever.info
4365mi.ww17.boys4ever.info
4366mk.ww17.boys4ever.info
4367ml.ww17.boys4ever.info
4368mn.ww17.boys4ever.info
4369mobile.ww17.boys4ever.info
4370mom.ww17.boys4ever.info
4371monitoring.ww17.boys4ever.info
4372moscow.ww17.boys4ever.info
4373mp3.ww17.boys4ever.info
4374mpeg.ww17.boys4ever.info
4375mp.ww17.boys4ever.info
4376mssql01.ww17.boys4ever.info
4377mssql0.ww17.boys4ever.info
4378ms-sql.ww17.boys4ever.info
4379ms.ww17.boys4ever.info
4380mta.ww17.boys4ever.info
4381mt.ww17.boys4ever.info
4382multimedia.ww17.boys4ever.info
4383music.ww17.boys4ever.info
4384m.ww17.boys4ever.info
4385mw.ww17.boys4ever.info
4386mx.ww17.boys4ever.info
4387mysql0.ww17.boys4ever.info
4388mysql1.ww17.boys4ever.info
4389mysql.ww17.boys4ever.info
4390my.ww17.boys4ever.info
4391mz.ww17.boys4ever.info170.178.168.203
4392nashville.ww17.boys4ever.info
4393nat.ww17.boys4ever.info
4394nd.ww17.boys4ever.info
4395netapp.ww17.boys4ever.info
4396netscreen.ww17.boys4ever.info
4397network.ww17.boys4ever.info
4398net.ww17.boys4ever.info170.178.168.203
4399nevada.ww17.boys4ever.info
4400newjersey.ww17.boys4ever.info
4401newmexico.ww17.boys4ever.info
4402newsfeed.ww17.boys4ever.info
4403newton.ww17.boys4ever.info
4404newyork.ww17.boys4ever.info
4405newzealand.ww17.boys4ever.info
4406nf.ww17.boys4ever.info
4407nj.ww17.boys4ever.info
4408nl.ww17.boys4ever.info
4409nms.ww17.boys4ever.info170.178.168.203
4410nokia.ww17.boys4ever.info
4411northcarolina.ww17.boys4ever.info
4412northeast.ww17.boys4ever.info
4413northwest.ww17.boys4ever.info
4414novell.ww17.boys4ever.info
4415np.ww17.boys4ever.info
4416ns01.ww17.boys4ever.info
4417ns2.ww17.boys4ever.info
4418ns3.ww17.boys4ever.info
4419ns5.ww17.boys4ever.info
4420ns-.ww17.boys4ever.info
4421nt.ww17.boys4ever.info
4422null.ww17.boys4ever.info
4423nv.ww17.boys4ever.info
4424nz.ww17.boys4ever.info
4425oakland.ww17.boys4ever.info
4426ocean.ww17.boys4ever.info
4427oh.ww17.boys4ever.info
4428oklahoma.ww17.boys4ever.info
4429old.ww17.boys4ever.info
4430omicron.ww17.boys4ever.info
4431om.ww17.boys4ever.info
4432ontario.ww17.boys4ever.info
4433openbsd.ww17.boys4ever.info
4434openview.ww17.boys4ever.info
4435open.ww17.boys4ever.info
4436ops01.ww17.boys4ever.info
4437ops02.ww17.boys4ever.info
4438ops1.ww17.boys4ever.info
4439ops2.ww17.boys4ever.info
4440opsware.ww17.boys4ever.info
4441orange.ww17.boys4ever.info
4442order.ww17.boys4ever.info
4443outgoing.ww17.boys4ever.info
4444outlook.ww17.boys4ever.info
4445out.ww17.boys4ever.info
4446owa02.ww17.boys4ever.info
4447owa1.ww17.boys4ever.info
4448owa2.ww17.boys4ever.info
4449ows.ww17.boys4ever.info
4450oxnard.ww17.boys4ever.info
4451pages.ww17.boys4ever.info
4452page.ww17.boys4ever.info
4453paginas.ww17.boys4ever.info
4454parners.ww17.boys4ever.info
4455partners.ww17.boys4ever.info
4456pa.ww17.boys4ever.info
4457pbx.ww17.boys4ever.info
4458pc01.ww17.boys4ever.info
4459pc101.ww17.boys4ever.info
4460pc10.ww17.boys4ever.info
4461pc11.ww17.boys4ever.info
4462pc12.ww17.boys4ever.info
4463pc16.ww17.boys4ever.info
4464pc18.ww17.boys4ever.info
4465pc1.ww17.boys4ever.info
4466pc23.ww17.boys4ever.info
4467pc26.ww17.boys4ever.info
4468pc28.ww17.boys4ever.info
4469pc30.ww17.boys4ever.info
4470pc32.ww17.boys4ever.info
4471pc34.ww17.boys4ever.info170.178.168.203
4472pc35.ww17.boys4ever.info
4473pc41.ww17.boys4ever.info
4474pc42.ww17.boys4ever.info
4475pc46.ww17.boys4ever.info
4476pc48.ww17.boys4ever.info
4477pc49.ww17.boys4ever.info
4478pc50.ww17.boys4ever.info
4479pc53.ww17.boys4ever.info
4480pc55.ww17.boys4ever.info
4481pc57.ww17.boys4ever.info
4482pc59.ww17.boys4ever.info
4483pc6.ww17.boys4ever.info
4484pc7.ww17.boys4ever.info
4485pc.ww17.boys4ever.info
4486pegasus.ww17.boys4ever.info
4487peoplesoft.ww17.boys4ever.info
4488personal.ww17.boys4ever.info
4489philadelphia.ww17.boys4ever.info
4490phi.ww17.boys4ever.info
4491phoeniz.ww17.boys4ever.info
4492phones.ww17.boys4ever.info
4493photos.ww17.boys4ever.info
4494pics.ww17.boys4ever.info
4495pictures.ww17.boys4ever.info
4496pink.ww17.boys4ever.info
4497pipex-gw.ww17.boys4ever.info
4498pi.ww17.boys4ever.info
4499pix.ww17.boys4ever.info
4500pki.ww17.boys4ever.info
4501plano.ww17.boys4ever.info
4502platinum.ww17.boys4ever.info
4503pn.ww17.boys4ever.info
4504pop3.ww17.boys4ever.info
4505portals.ww17.boys4ever.info
4506portland.ww17.boys4ever.info
4507postales.ww17.boys4ever.info
4508po.ww17.boys4ever.info
4509ppp11.ww17.boys4ever.info
4510ppp12.ww17.boys4ever.info
4511ppp18.ww17.boys4ever.info
4512ppp19.ww17.boys4ever.info
4513ppp1.ww17.boys4ever.info
4514ppp20.ww17.boys4ever.info
4515ppp4.ww17.boys4ever.info
4516ppp5.ww17.boys4ever.info
4517ppp8.ww17.boys4ever.info
4518ppp9.ww17.boys4ever.info
4519pptp.ww17.boys4ever.info
4520prensa.ww17.boys4ever.info
4521printer.ww17.boys4ever.info
4522printserver.ww17.boys4ever.info
4523printserv.ww17.boys4ever.info
4524priv.ww17.boys4ever.info
4525projects.ww17.boys4ever.info
4526project.ww17.boys4ever.info
4527promo.ww17.boys4ever.info
4528psi.ww17.boys4ever.info
4529ps.ww17.boys4ever.info
4530pt.ww17.boys4ever.info
4531public.ww17.boys4ever.info
4532purple.ww17.boys4ever.info
4533qa.ww17.boys4ever.info
4534r1.ww17.boys4ever.info
4535raptor.ww17.boys4ever.info
4536ras.ww17.boys4ever.info
4537recruiting.ww17.boys4ever.info
4538redhat.ww17.boys4ever.info
4539red.ww17.boys4ever.info
4540reference.ww17.boys4ever.info
4541ref.ww17.boys4ever.info
4542registry.ww17.boys4ever.info
4543regs.ww17.boys4ever.info
4544reg.ww17.boys4ever.info
4545relay.ww17.boys4ever.info
4546remote.ww17.boys4ever.info
4547research.ww17.boys4ever.info
4548reserved.ww17.boys4ever.info
4549resumenes.ww17.boys4ever.info
4550ri.ww17.boys4ever.info
4551romeo.ww17.boys4ever.info
4552root.ww17.boys4ever.info
4553router.ww17.boys4ever.info
4554route.ww17.boys4ever.info
4555rs.ww17.boys4ever.info
4556rtelnet.ww17.boys4ever.info
4557rtr01.ww17.boys4ever.info
4558rune.ww17.boys4ever.info
4559ru.ww17.boys4ever.info
4560rwhois.ww17.boys4ever.info
4561s1.ww17.boys4ever.info
4562sac.ww17.boys4ever.info
4563sadmin.ww17.boys4ever.info
4564safe.ww17.boys4ever.info
4565sanantonio.ww17.boys4ever.info
4566sanjose.ww17.boys4ever.info
4567saskatchewan.ww17.boys4ever.info
4568sa.ww17.boys4ever.info
4569sbs.ww17.boys4ever.info
4570scanner.ww17.boys4ever.info
4571schedules.ww17.boys4ever.info
4572scotty.ww17.boys4ever.info
4573sc.ww17.boys4ever.info
4574sd.ww17.boys4ever.info
4575seattle.ww17.boys4ever.info
4576secured.ww17.boys4ever.info
4577security.ww17.boys4ever.info
4578seri.ww17.boys4ever.info
4579serv2.ww17.boys4ever.info
4580servidor.ww17.boys4ever.info
4581serv.ww17.boys4ever.info
4582se.ww17.boys4ever.info
4583shared.ww17.boys4ever.info
4584shareware.ww17.boys4ever.info
4585shoppers.ww17.boys4ever.info
4586shopping.ww17.boys4ever.info
4587shop.ww17.boys4ever.info
4588sh.ww17.boys4ever.info
4589signup.ww17.boys4ever.info
4590sim.ww17.boys4ever.info
4591si.ww17.boys4ever.info
4592sj.ww17.boys4ever.info
4593slmail.ww17.boys4ever.info
4594sl.ww17.boys4ever.info
4595smc.ww17.boys4ever.info
4596smtp.ww17.boys4ever.info
4597sniffer.ww17.boys4ever.info
4598snmpd.ww17.boys4ever.info
4599snmp.ww17.boys4ever.info
4600sn.ww17.boys4ever.info
4601software.ww17.boys4ever.info
4602sol.ww17.boys4ever.info
4603sourcesafe.ww17.boys4ever.info
4604southcarolina.ww17.boys4ever.info
4605southeast.ww17.boys4ever.info
4606southwest.ww17.boys4ever.info
4607so.ww17.boys4ever.info
4608spain.ww17.boys4ever.info
4609spam.ww17.boys4ever.info
4610spiderman.ww17.boys4ever.info
4611spock.ww17.boys4ever.info
4612spokane.ww17.boys4ever.info
4613sprint.ww17.boys4ever.info
4614sqa.ww17.boys4ever.info
4615sql0.ww17.boys4ever.info
4616sql1.ww17.boys4ever.info
4617ssh.ww17.boys4ever.info
4618ssl1.ww17.boys4ever.info
4619ss.ww17.boys4ever.info
4620staff.ww17.boys4ever.info
4621start.ww17.boys4ever.info
4622static.ww17.boys4ever.info
4623statistics.ww17.boys4ever.info
4624stats.ww17.boys4ever.info
4625stlouis.ww17.boys4ever.info
4626stock.ww17.boys4ever.info
4627storage.ww17.boys4ever.info
4628storefront.ww17.boys4ever.info
4629store.ww17.boys4ever.info
4630streaming.ww17.boys4ever.info
4631strongmail.ww17.boys4ever.info
4632studio.ww17.boys4ever.info
4633st.ww17.boys4ever.info
4634submit.ww17.boys4ever.info
4635sun0.ww17.boys4ever.info
4636sun2.ww17.boys4ever.info
4637sun.ww17.boys4ever.info
4638superman.ww17.boys4ever.info
4639supplier.ww17.boys4ever.info
4640support.ww17.boys4ever.info
4641sv.ww17.boys4ever.info
4642sw01.ww17.boys4ever.info
4643sw0.ww17.boys4ever.info
4644switch.ww17.boys4ever.info
4645s.ww17.boys4ever.info
4646sw.ww17.boys4ever.info
4647sybase.ww17.boys4ever.info
4648sysadmin.ww17.boys4ever.info
4649sysback.ww17.boys4ever.info
4650sy.ww17.boys4ever.info
4651tacoma.ww17.boys4ever.info
4652taiwan.ww17.boys4ever.info
4653tampa.ww17.boys4ever.info
4654tcl.ww17.boys4ever.info
4655tc.ww17.boys4ever.info
4656td.ww17.boys4ever.info170.178.168.203
4657team.ww17.boys4ever.info
4658telephone.ww17.boys4ever.info
4659tennessee.ww17.boys4ever.info
4660terminal.ww17.boys4ever.info
4661termserv.ww17.boys4ever.info
4662testajax.ww17.boys4ever.info
4663testcf.ww17.boys4ever.info
4664testlab.ww17.boys4ever.info
4665testphp.ww17.boys4ever.info
4666testserver.ww17.boys4ever.info
4667testsite.ww17.boys4ever.info
4668test.ww17.boys4ever.info
4669testxp.ww17.boys4ever.info
4670texas.ww17.boys4ever.info
4671thailand.ww17.boys4ever.info
4672tienda.ww17.boys4ever.info
4673tm.ww17.boys4ever.info
4674tn.ww17.boys4ever.info
4675tokyo.ww17.boys4ever.info
4676tom.ww17.boys4ever.info
4677training.ww17.boys4ever.info
4678train.ww17.boys4ever.info
4679trinidad.ww17.boys4ever.info
4680ts1.ww17.boys4ever.info
4681ts.ww17.boys4ever.info
4682tucson.ww17.boys4ever.info
4683tulsa.ww17.boys4ever.info
4684tw.ww17.boys4ever.info
4685tx.ww17.boys4ever.info
4686uniform.ww17.boys4ever.info
4687updates.ww17.boys4ever.info
4688upload.ww17.boys4ever.info
4689upsilon.ww17.boys4ever.info
4690urchin.ww17.boys4ever.info
4691usa.ww17.boys4ever.info
4692usenet.ww17.boys4ever.info
4693us.ww17.boys4ever.info
4694utah.ww17.boys4ever.info
4695utilities.ww17.boys4ever.info170.178.168.203
4696uy.ww17.boys4ever.info
4697v6.ww17.boys4ever.info
4698vantive.ww17.boys4ever.info
4699vault.ww17.boys4ever.info
4700va.ww17.boys4ever.info
4701vega.ww17.boys4ever.info
4702vend.ww17.boys4ever.info
4703venus.ww17.boys4ever.info
4704vermont.ww17.boys4ever.info
4705ve.ww17.boys4ever.info
4706videos.ww17.boys4ever.info
4707viking.ww17.boys4ever.info
4708violet.ww17.boys4ever.info
4709vip.ww17.boys4ever.info
4710vmware.ww17.boys4ever.info
4711vn.ww17.boys4ever.info
4712voyager.ww17.boys4ever.info
4713vpn01.ww17.boys4ever.info
4714vpn02.ww17.boys4ever.info
4715vpn0.ww17.boys4ever.info
4716vpn1.ww17.boys4ever.info
4717vpn.ww17.boys4ever.info
4718vt.ww17.boys4ever.info
4719w1.ww17.boys4ever.info
4720w2.ww17.boys4ever.info
4721w3.ww17.boys4ever.info
4722wais.ww17.boys4ever.info
4723warehouse.ww17.boys4ever.info
4724wa.ww17.boys4ever.info
4725wc3.ww17.boys4ever.info
4726webboard.ww17.boys4ever.info
4727webcam.ww17.boys4ever.info
4728webfarm.ww17.boys4ever.info
4729webhelp.ww17.boys4ever.info
4730weblib.ww17.boys4ever.info
4731webmaster.ww17.boys4ever.info
4732webproxy.ww17.boys4ever.info
4733website.ww17.boys4ever.info
4734websphere.ww17.boys4ever.info
4735websvr.ww17.boys4ever.info
4736webs.ww17.boys4ever.info
4737webtrends.ww17.boys4ever.info
4738welcome.ww17.boys4ever.info
4739westvirginia.ww17.boys4ever.info
4740wf.ww17.boys4ever.info
4741white.ww17.boys4ever.info
4742whois.ww17.boys4ever.info
4743wiki.ww17.boys4ever.info
4744win1.ww17.boys4ever.info
4745win2k3.ww17.boys4ever.info
4746windows01.ww17.boys4ever.info170.178.168.203
4747windows2003.ww17.boys4ever.info
4748windows2.ww17.boys4ever.info170.178.168.203
4749wingate.ww17.boys4ever.info
4750winproxy.ww17.boys4ever.info
4751wins.ww17.boys4ever.info
4752win.ww17.boys4ever.info
4753wire.ww17.boys4ever.info
4754wisconsin.ww17.boys4ever.info
4755wlan.ww17.boys4ever.info170.178.168.203
4756wordpress.ww17.boys4ever.info
4757ws10.ww17.boys4ever.info
4758ws12.ww17.boys4ever.info
4759ws13.ww17.boys4ever.info
4760ws2.ww17.boys4ever.info
4761ws4.ww17.boys4ever.info
4762ws5.ww17.boys4ever.info170.178.168.203
4763wusage.ww17.boys4ever.info
4764ww17.boys4ever.info
4765www-01.ww17.boys4ever.info
4766www01.ww17.boys4ever.info
4767www02.ww17.boys4ever.info
4768www0.ww17.boys4ever.info
4769w.ww17.boys4ever.info
4770www1.ww17.boys4ever.info
4771www3.ww17.boys4ever.info
4772wwwchat.ww17.boys4ever.info
4773wwwmail.ww17.boys4ever.info
4774ww.ww17.boys4ever.info
4775www-.ww17.boys4ever.info
4776www.ww17.boys4ever.info
4777wyoming.ww17.boys4ever.info
4778xlogan.ww17.boys4ever.info
4779xml.ww17.boys4ever.info
4780young.ww17.boys4ever.info
4781y.ww17.boys4ever.info
4782zebra.ww17.boys4ever.info
4783z-log.ww17.boys4ever.info
4784zulu.ww17.boys4ever.info
4785z.ww17.boys4ever.info
4786zw.ww17.boys4ever.info
4787#######################################################################################################################################
4788[*] Found SPF record:
4789[*] v=spf1 a -all
4790[*] SPF record contains an All item: -all
4791[*] No DMARC record found. Looking for organizational record
4792[+] No organizational DMARC record
4793[+] Spoofing possible for ww17.boys4ever.info!
4794##################################################################################################################################
4795; <<>> DiG 9.11.14-3-Debian <<>> frontdesk.ww17.boys4ever.info CNAME
4796;frontdesk.ww17.boys4ever.info. IN CNAME
4797frontdesk.ww17.boys4ever.info. 60 IN SOA ns1.above.com. hostmaster.trellian.com. 2020021101 10800 3600 604800 3600
4798; <<>> DiG 9.11.14-3-Debian <<>> helpdesk.ww17.boys4ever.info CNAME
4799;helpdesk.ww17.boys4ever.info. IN CNAME
4800helpdesk.ww17.boys4ever.info. 60 IN SOA ns2.above.com. hostmaster.trellian.com. 2020021101 10800 3600 604800 3600
4801; <<>> DiG 9.11.14-3-Debian <<>> monitoring.ww17.boys4ever.info CNAME
4802;monitoring.ww17.boys4ever.info. IN CNAME
4803monitoring.ww17.boys4ever.info. 60 IN SOA ns1.above.com. hostmaster.trellian.com. 2020021101 10800 3600 604800 3600
4804; <<>> DiG 9.11.14-3-Debian <<>> newsfeed.ww17.boys4ever.info CNAME
4805;newsfeed.ww17.boys4ever.info. IN CNAME
4806newsfeed.ww17.boys4ever.info. 60 IN SOA ns1.above.com. hostmaster.trellian.com. 2020021101 10800 3600 604800 3600
4807; <<>> DiG 9.11.14-3-Debian <<>> wordpress.ww17.boys4ever.info CNAME
4808;wordpress.ww17.boys4ever.info. IN CNAME
4809wordpress.ww17.boys4ever.info. 60 IN SOA ns1.above.com. hostmaster.trellian.com. 2020021101 10800 3600 604800 3600
4810###################################################################################################################################
4811[Not Vulnerable] 01.ww17.boys4ever.info170.178.168.203
4812[Not Vulnerable] 20.ww17.boys4ever.info
4813[Not Vulnerable] 3.ww17.boys4ever.info
4814[Not Vulnerable] abc.ww17.boys4ever.info
4815[Not Vulnerable] a2.ww17.boys4ever.info
4816[Not Vulnerable] 19.ww17.boys4ever.info
4817[Not Vulnerable] 6.ww17.boys4ever.info
4818[Not Vulnerable] accounting.ww17.boys4ever.info
4819[Not Vulnerable] a01.ww17.boys4ever.info
4820[Not Vulnerable] 13.ww17.boys4ever.info
4821[Not Vulnerable] 02.ww17.boys4ever.info
4822[Not Vulnerable] 18.ww17.boys4ever.info
4823[Not Vulnerable] acceso.ww17.boys4ever.info
4824[Not Vulnerable] 03.ww17.boys4ever.info
4825[Not Vulnerable] 17.ww17.boys4ever.info
4826[Not Vulnerable] 12.ww17.boys4ever.info
4827[Not Vulnerable] 16.ww17.boys4ever.info
4828[Not Vulnerable] a1.ww17.boys4ever.info
4829[Not Vulnerable] 15.ww17.boys4ever.info
4830[Not Vulnerable] 5.ww17.boys4ever.info
4831[Not Vulnerable] ac.ww17.boys4ever.info
4832[Not Vulnerable] administrador.ww17.boys4ever.info
4833[Not Vulnerable] adkit.ww17.boys4ever.info
4834[Not Vulnerable] administrators.ww17.boys4ever.info
4835[Not Vulnerable] adsl.ww17.boys4ever.info
4836[Not Vulnerable] administrator.ww17.boys4ever.info
4837[Not Vulnerable] af.ww17.boys4ever.info
4838[Not Vulnerable] aix.ww17.boys4ever.info
4839[Not Vulnerable] alerts.ww17.boys4ever.info
4840[Not Vulnerable] alpha.ww17.boys4ever.info
4841[Not Vulnerable] ad.ww17.boys4ever.info
4842[Not Vulnerable] alaska.ww17.boys4ever.info
4843[Not Vulnerable] alterwind.ww17.boys4ever.info
4844[Not Vulnerable] antivirus.ww17.boys4ever.info
4845[Not Vulnerable] announce.ww17.boys4ever.info
4846[Not Vulnerable] announcements.ww17.boys4ever.info
4847[Not Vulnerable] am.ww17.boys4ever.info
4848[Not Vulnerable] anaheim.ww17.boys4ever.info
4849[Not Vulnerable] apache.ww17.boys4ever.info
4850[Not Vulnerable] application.ww17.boys4ever.info170.178.168.203
4851[Not Vulnerable] apollo.ww17.boys4ever.info
4852[Not Vulnerable] admins.ww17.boys4ever.info
4853[Not Vulnerable] archie.ww17.boys4ever.info
4854[Not Vulnerable] auction.ww17.boys4ever.info170.178.168.203
4855[Not Vulnerable] app01.ww17.boys4ever.info
4856[Not Vulnerable] apps.ww17.boys4ever.info
4857[Not Vulnerable] as.ww17.boys4ever.info
4858[Not Vulnerable] asterix.ww17.boys4ever.info
4859[Not Vulnerable] auth.ww17.boys4ever.info
4860[Not Vulnerable] au.ww17.boys4ever.info
4861[Not Vulnerable] asia.ww17.boys4ever.info
4862[Not Vulnerable] auto.ww17.boys4ever.info
4863[Not Vulnerable] aq.ww17.boys4ever.info
4864[Not Vulnerable] athena.ww17.boys4ever.info
4865[Not Vulnerable] att.ww17.boys4ever.info
4866[Not Vulnerable] a.ww17.boys4ever.info
4867[Not Vulnerable] atlanta.ww17.boys4ever.info
4868[Not Vulnerable] at.ww17.boys4ever.info
4869[Not Vulnerable] av.ww17.boys4ever.info
4870[Not Vulnerable] aw.ww17.boys4ever.info
4871[Not Vulnerable] b01.ww17.boys4ever.info
4872[Not Vulnerable] ayuda.ww17.boys4ever.info
4873[Not Vulnerable] b2c.ww17.boys4ever.info
4874[Not Vulnerable] backend.ww17.boys4ever.info
4875[Not Vulnerable] b2b.ww17.boys4ever.info
4876[Not Vulnerable] backup.ww17.boys4ever.info
4877[Not Vulnerable] back.ww17.boys4ever.info
4878[Not Vulnerable] bakersfield.ww17.boys4ever.info
4879[Not Vulnerable] banking.ww17.boys4ever.info
4880[Not Vulnerable] ba.ww17.boys4ever.info
4881[Not Vulnerable] baltimore.ww17.boys4ever.info
4882[Not Vulnerable] bayarea.ww17.boys4ever.info
4883[Not Vulnerable] balancer.ww17.boys4ever.info
4884[Not Vulnerable] b.auth-ns.ww17.boys4ever.info
4885[Not Vulnerable] bbdd.ww17.boys4ever.info
4886[Not Vulnerable] bd.ww17.boys4ever.info
4887[Not Vulnerable] blackberry.ww17.boys4ever.info
4888[Not Vulnerable] be.ww17.boys4ever.info
4889[Not Vulnerable] bm.ww17.boys4ever.info
4890[Not Vulnerable] black.ww17.boys4ever.info
4891[Not Vulnerable] bn.ww17.boys4ever.info
4892[Not Vulnerable] bolsa.ww17.boys4ever.info
4893[Not Vulnerable] bb.ww17.boys4ever.info
4894[Not Vulnerable] boise.ww17.boys4ever.info
4895[Not Vulnerable] boston.ww17.boys4ever.info
4896[Not Vulnerable] blog.ww17.boys4ever.info
4897[Not Vulnerable] brazil.ww17.boys4ever.info
4898[Not Vulnerable] broadcast.ww17.boys4ever.info
4899[Not Vulnerable] bronze.ww17.boys4ever.info
4900[Not Vulnerable] bsd2.ww17.boys4ever.info
4901[Not Vulnerable] bs.ww17.boys4ever.info
4902[Not Vulnerable] bsd.ww17.boys4ever.info
4903[Not Vulnerable] brown.ww17.boys4ever.info
4904[Not Vulnerable] buscador.ww17.boys4ever.info
4905[Not Vulnerable] bv.ww17.boys4ever.info
4906[Not Vulnerable] bz.ww17.boys4ever.info
4907[Not Vulnerable] by.ww17.boys4ever.info
4908[Not Vulnerable] cache.ww17.boys4ever.info
4909[Not Vulnerable] calvin.ww17.boys4ever.info
4910[Not Vulnerable] bw.ww17.boys4ever.info
4911[Not Vulnerable] careers.ww17.boys4ever.info
4912[Not Vulnerable] call.ww17.boys4ever.info
4913[Not Vulnerable] b.ww17.boys4ever.info
4914[Not Vulnerable] canada.ww17.boys4ever.info
4915[Not Vulnerable] buy.ww17.boys4ever.info
4916[Not Vulnerable] canon.ww17.boys4ever.info
4917[Not Vulnerable] canal.ww17.boys4ever.info
4918[Not Vulnerable] cafe.ww17.boys4ever.info
4919[Not Vulnerable] catalog.ww17.boys4ever.info
4920[Not Vulnerable] cf.ww17.boys4ever.info170.178.168.203
4921[Not Vulnerable] c.auth-ns.ww17.boys4ever.info
4922[Not Vulnerable] cc.ww17.boys4ever.info
4923[Not Vulnerable] cert.ww17.boys4ever.info
4924[Not Vulnerable] certify.ww17.boys4ever.info
4925[Not Vulnerable] channel.ww17.boys4ever.info
4926[Not Vulnerable] chats.ww17.boys4ever.info
4927[Not Vulnerable] ch.ww17.boys4ever.info
4928[Not Vulnerable] cincinnati.ww17.boys4ever.info
4929[Not Vulnerable] charlie.ww17.boys4ever.info
4930[Not Vulnerable] chicago.ww17.boys4ever.info
4931[Not Vulnerable] citrix.ww17.boys4ever.info
4932[Not Vulnerable] clientes.ww17.boys4ever.info
4933[Not Vulnerable] cisco.ww17.boys4ever.info
4934[Not Vulnerable] client.ww17.boys4ever.info
4935[Not Vulnerable] classifieds.ww17.boys4ever.info
4936[Not Vulnerable] clusters.ww17.boys4ever.info
4937[Not Vulnerable] ci.ww17.boys4ever.info
4938[Not Vulnerable] clicktrack.ww17.boys4ever.info
4939[Not Vulnerable] cleveland.ww17.boys4ever.info
4940[Not Vulnerable] clubs.ww17.boys4ever.info
4941[Not Vulnerable] clients.ww17.boys4ever.info
4942[Not Vulnerable] cms.ww17.boys4ever.info
4943[Not Vulnerable] cl.ww17.boys4ever.info
4944[Not Vulnerable] club.ww17.boys4ever.info
4945[Not Vulnerable] communigate.ww17.boys4ever.info
4946[Not Vulnerable] code.ww17.boys4ever.info
4947[Not Vulnerable] cocoa.ww17.boys4ever.info
4948[Not Vulnerable] community.ww17.boys4ever.info
4949[Not Vulnerable] commerceserver.ww17.boys4ever.info
4950[Not Vulnerable] columbus.ww17.boys4ever.info
4951[Not Vulnerable] contracts.ww17.boys4ever.info
4952[Not Vulnerable] counterstrike.ww17.boys4ever.info
4953[Not Vulnerable] cm.ww17.boys4ever.info
4954[Not Vulnerable] core.ww17.boys4ever.info
4955[Not Vulnerable] correo.ww17.boys4ever.info
4956[Not Vulnerable] colombus.ww17.boys4ever.info
4957[Not Vulnerable] concentrator.ww17.boys4ever.info
4958[Not Vulnerable] consultant.ww17.boys4ever.info
4959[Not Vulnerable] cso.ww17.boys4ever.info170.178.168.203
4960[Not Vulnerable] conf.ww17.boys4ever.info
4961[Not Vulnerable] cricket.ww17.boys4ever.info
4962[Not Vulnerable] crs.ww17.boys4ever.info
4963[Not Vulnerable] consola.ww17.boys4ever.info
4964[Not Vulnerable] co.ww17.boys4ever.info
4965[Not Vulnerable] contact.ww17.boys4ever.info
4966[Not Vulnerable] core01.ww17.boys4ever.info
4967[Not Vulnerable] cn.ww17.boys4ever.info
4968[Not Vulnerable] cust103.ww17.boys4ever.info
4969[Not Vulnerable] cr.ww17.boys4ever.info
4970[Not Vulnerable] cust108.ww17.boys4ever.info
4971[Not Vulnerable] cust102.ww17.boys4ever.info
4972[Not Vulnerable] cust106.ww17.boys4ever.info
4973[Not Vulnerable] confidential.ww17.boys4ever.info
4974[Not Vulnerable] ct.ww17.boys4ever.info
4975[Not Vulnerable] cust110.ww17.boys4ever.info
4976[Not Vulnerable] cust11.ww17.boys4ever.info
4977[Not Vulnerable] cust117.ww17.boys4ever.info
4978[Not Vulnerable] cust114.ww17.boys4ever.info
4979[Not Vulnerable] cust119.ww17.boys4ever.info
4980[Not Vulnerable] cust101.ww17.boys4ever.info
4981[Not Vulnerable] cust115.ww17.boys4ever.info
4982[Not Vulnerable] cust125.ww17.boys4ever.info
4983[Not Vulnerable] cust126.ww17.boys4ever.info
4984[Not Vulnerable] cust124.ww17.boys4ever.info
4985[Not Vulnerable] cust12.ww17.boys4ever.info
4986[Not Vulnerable] cust14.ww17.boys4ever.info
4987[Not Vulnerable] cust26.ww17.boys4ever.info
4988[Not Vulnerable] cust109.ww17.boys4ever.info
4989[Not Vulnerable] cust18.ww17.boys4ever.info
4990[Not Vulnerable] cust122.ww17.boys4ever.info
4991[Not Vulnerable] cust121.ww17.boys4ever.info
4992[Not Vulnerable] cust33.ww17.boys4ever.info
4993[Not Vulnerable] cust22.ww17.boys4ever.info
4994[Not Vulnerable] cust2.ww17.boys4ever.info
4995[Not Vulnerable] cust39.ww17.boys4ever.info
4996[Not Vulnerable] cust34.ww17.boys4ever.info
4997[Not Vulnerable] cust38.ww17.boys4ever.info
4998[Not Vulnerable] cust36.ww17.boys4ever.info
4999[Not Vulnerable] cust31.ww17.boys4ever.info
5000[Not Vulnerable] cust54.ww17.boys4ever.info170.178.168.203
5001[Not Vulnerable] cust43.ww17.boys4ever.info
5002[Not Vulnerable] cust51.ww17.boys4ever.info
5003[Not Vulnerable] cust48.ww17.boys4ever.info
5004[Not Vulnerable] cust53.ww17.boys4ever.info
5005[Not Vulnerable] cust40.ww17.boys4ever.info
5006[Not Vulnerable] cust49.ww17.boys4ever.info
5007[Not Vulnerable] cust55.ww17.boys4ever.info
5008[Not Vulnerable] cust58.ww17.boys4ever.info
5009[Not Vulnerable] cust60.ww17.boys4ever.info
5010[Not Vulnerable] cust5.ww17.boys4ever.info
5011[Not Vulnerable] cust7.ww17.boys4ever.info
5012[Not Vulnerable] cust75.ww17.boys4ever.info
5013[Not Vulnerable] cust67.ww17.boys4ever.info
5014[Not Vulnerable] cust69.ww17.boys4ever.info
5015[Not Vulnerable] cust78.ww17.boys4ever.info
5016[Not Vulnerable] cust80.ww17.boys4ever.info
5017[Not Vulnerable] cust57.ww17.boys4ever.info
5018[Not Vulnerable] cust81.ww17.boys4ever.info
5019[Not Vulnerable] cust65.ww17.boys4ever.info
5020[Not Vulnerable] cust84.ww17.boys4ever.info170.178.168.203
5021[Not Vulnerable] cust66.ww17.boys4ever.info
5022[Not Vulnerable] cust8.ww17.boys4ever.info
5023[Not Vulnerable] cust85.ww17.boys4ever.info
5024[Not Vulnerable] cust83.ww17.boys4ever.info
5025[Not Vulnerable] cust89.ww17.boys4ever.info
5026[Not Vulnerable] cust86.ww17.boys4ever.info
5027[Not Vulnerable] cust87.ww17.boys4ever.info
5028[Not Vulnerable] cx.ww17.boys4ever.info170.178.168.203
5029[Not Vulnerable] cust96.ww17.boys4ever.info
5030[Not Vulnerable] cust91.ww17.boys4ever.info
5031[Not Vulnerable] cust92.ww17.boys4ever.info
5032[Not Vulnerable] cust93.ww17.boys4ever.info
5033[Not Vulnerable] cust97.ww17.boys4ever.info170.178.168.203
5034[Not Vulnerable] cvs.ww17.boys4ever.info
5035[Not Vulnerable] cz.ww17.boys4ever.info
5036[Not Vulnerable] cust98.ww17.boys4ever.info
5037[Not Vulnerable] cu.ww17.boys4ever.info
5038[Not Vulnerable] database02.ww17.boys4ever.info
5039[Not Vulnerable] dallas.ww17.boys4ever.info
5040[Not Vulnerable] database1.ww17.boys4ever.info
5041[Not Vulnerable] databases.ww17.boys4ever.info
5042[Not Vulnerable] datastore.ww17.boys4ever.info
5043[Not Vulnerable] db1.ww17.boys4ever.info
5044[Not Vulnerable] db02.ww17.boys4ever.info
5045[Not Vulnerable] db2.ww17.boys4ever.info
5046[Not Vulnerable] dell.ww17.boys4ever.info
5047[Not Vulnerable] demonstration.ww17.boys4ever.info
5048[Not Vulnerable] db.ww17.boys4ever.info
5049[Not Vulnerable] designer.ww17.boys4ever.info170.178.168.203
5050[Not Vulnerable] delta1.ww17.boys4ever.info
5051[Not Vulnerable] denver.ww17.boys4ever.info
5052[Not Vulnerable] desarrollo.ww17.boys4ever.info
5053[Not Vulnerable] develop.ww17.boys4ever.info
5054[Not Vulnerable] device.ww17.boys4ever.info
5055[Not Vulnerable] devsql.ww17.boys4ever.info
5056[Not Vulnerable] digital.ww17.boys4ever.info
5057[Not Vulnerable] dhcp.ww17.boys4ever.info
5058[Not Vulnerable] dilbert.ww17.boys4ever.info
5059[Not Vulnerable] delta.ww17.boys4ever.info
5060[Not Vulnerable] directory.ww17.boys4ever.info
5061[Not Vulnerable] devserver.ww17.boys4ever.info
5062[Not Vulnerable] dir.ww17.boys4ever.info
5063[Not Vulnerable] discussions.ww17.boys4ever.info
5064[Not Vulnerable] discuss.ww17.boys4ever.info
5065[Not Vulnerable] disc.ww17.boys4ever.info
5066[Not Vulnerable] disney.ww17.boys4ever.info
5067[Not Vulnerable] disk.ww17.boys4ever.info
5068[Not Vulnerable] domain
5069[Not Vulnerable] docs.ww17.boys4ever.info
5070[Not Vulnerable] domains.ww17.boys4ever.info
5071[Not Vulnerable] documentacion.ww17.boys4ever.info
5072[Not Vulnerable] dominoweb.ww17.boys4ever.info
5073[Not Vulnerable] downloads.ww17.boys4ever.info
5074[Not Vulnerable] dominio.ww17.boys4ever.info
5075[Not Vulnerable] dyn.ww17.boys4ever.info
5076[Not Vulnerable] drupal.ww17.boys4ever.info
5077[Not Vulnerable] download.ww17.boys4ever.info
5078[Not Vulnerable] dynip.ww17.boys4ever.info
5079[Not Vulnerable] eagle.ww17.boys4ever.info
5080[Not Vulnerable] downtown.ww17.boys4ever.info
5081[Not Vulnerable] dz.ww17.boys4ever.info
5082[Not Vulnerable] earth.ww17.boys4ever.info
5083[Not Vulnerable] east.ww17.boys4ever.info
5084[Not Vulnerable] e-com.ww17.boys4ever.info
5085[Not Vulnerable] dnews.ww17.boys4ever.info
5086[Not Vulnerable] distributer.ww17.boys4ever.info
5087[Not Vulnerable] dj.ww17.boys4ever.info
5088[Not Vulnerable] e-commerce.ww17.boys4ever.info
5089[Not Vulnerable] dns.ww17.boys4ever.info
5090[Not Vulnerable] dk.ww17.boys4ever.info
5091[Not Vulnerable] distributers.ww17.boys4ever.info
5092[Not Vulnerable] edu.ww17.boys4ever.info
5093[Not Vulnerable] ecom.ww17.boys4ever.info
5094[Not Vulnerable] education.ww17.boys4ever.info
5095[Not Vulnerable] empresa.ww17.boys4ever.info
5096[Not Vulnerable] ee.ww17.boys4ever.info
5097[Not Vulnerable] dns2.ww17.boys4ever.info
5098[Not Vulnerable] eng1.ww17.boys4ever.info
5099[Not Vulnerable] ejemplo.ww17.boys4ever.info
5100[Not Vulnerable] engine.ww17.boys4ever.info170.178.168.203
5101[Not Vulnerable] enable.ww17.boys4ever.info
5102[Not Vulnerable] engineer.ww17.boys4ever.info
5103[Not Vulnerable] es.ww17.boys4ever.info
5104[Not Vulnerable] esx.ww17.boys4ever.info
5105[Not Vulnerable] eta.ww17.boys4ever.info
5106[Not Vulnerable] exec.ww17.boys4ever.info
5107[Not Vulnerable] farm.ww17.boys4ever.info
5108[Not Vulnerable] europe.ww17.boys4ever.info
5109[Not Vulnerable] e.ww17.boys4ever.info
5110[Not Vulnerable] f5.ww17.boys4ever.info
5111[Not Vulnerable] en.ww17.boys4ever.info
5112[Not Vulnerable] eng.ww17.boys4ever.info
5113[Not Vulnerable] faststats.ww17.boys4ever.info
5114[Not Vulnerable] espanol.ww17.boys4ever.info
5115[Not Vulnerable] filestore.ww17.boys4ever.info
5116[Not Vulnerable] filter.ww17.boys4ever.info
5117[Not Vulnerable] fi.ww17.boys4ever.info
5118[Not Vulnerable] finger.ww17.boys4ever.info
5119[Not Vulnerable] fix.ww17.boys4ever.info
5120[Not Vulnerable] fj.ww17.boys4ever.info
5121[Not Vulnerable] fixes.ww17.boys4ever.info
5122[Not Vulnerable] flash.ww17.boys4ever.info
5123[Not Vulnerable] ftp-.ww17.boys4ever.info
5124[Not Vulnerable] flow.ww17.boys4ever.info
5125[Not Vulnerable] forums.ww17.boys4ever.info
5126[Not Vulnerable] freebsd01.ww17.boys4ever.info
5127[Not Vulnerable] fotos.ww17.boys4ever.info
5128[Not Vulnerable] france.ww17.boys4ever.info
5129[Not Vulnerable] freebsd1.ww17.boys4ever.info
5130[Not Vulnerable] fl.ww17.boys4ever.info
5131[Not Vulnerable] freebsd2.ww17.boys4ever.info
5132[Not Vulnerable] fox.ww17.boys4ever.info
5133[Not Vulnerable] fm.ww17.boys4ever.info
5134[Not Vulnerable] foundry.ww17.boys4ever.info
5135[Not Vulnerable] freeware.ww17.boys4ever.info
5136[Not Vulnerable] foobar.ww17.boys4ever.info
5137[Not Vulnerable] fred.ww17.boys4ever.info
5138[Not Vulnerable] fw-1.ww17.boys4ever.info
5139[Not Vulnerable] fwsm01.ww17.boys4ever.info
5140[Not Vulnerable] fw1.ww17.boys4ever.info
5141[Not Vulnerable] general.ww17.boys4ever.info170.178.168.203
5142[Not Vulnerable] frontdesk.ww17.boys4ever.info
5143[Not Vulnerable] front.ww17.boys4ever.info
5144[Not Vulnerable] gateway.ww17.boys4ever.info
5145[Not Vulnerable] ftp.ww17.boys4ever.info
5146[Not Vulnerable] gandalf.ww17.boys4ever.info
5147[Not Vulnerable] gate.ww17.boys4ever.info
5148[Not Vulnerable] fr.ww17.boys4ever.info
5149[Not Vulnerable] gemini.ww17.boys4ever.info
5150[Not Vulnerable] galeria.ww17.boys4ever.info
5151[Not Vulnerable] galerias.ww17.boys4ever.info
5152[Not Vulnerable] gatekeeper.ww17.boys4ever.info
5153[Not Vulnerable] gd.ww17.boys4ever.info
5154[Not Vulnerable] germany.ww17.boys4ever.info
5155[Not Vulnerable] georgia.ww17.boys4ever.info
5156[Not Vulnerable] glendale.ww17.boys4ever.info
5157[Not Vulnerable] gf.ww17.boys4ever.info
5158[Not Vulnerable] gp.ww17.boys4ever.info170.178.168.203
5159[Not Vulnerable] gm.ww17.boys4ever.info
5160[Not Vulnerable] guest.ww17.boys4ever.info
5161[Not Vulnerable] green.ww17.boys4ever.info
5162[Not Vulnerable] gu.ww17.boys4ever.info
5163[Not Vulnerable] golf.ww17.boys4ever.info
5164[Not Vulnerable] hawaii.ww17.boys4ever.info
5165[Not Vulnerable] hello.ww17.boys4ever.info
5166[Not Vulnerable] halflife.ww17.boys4ever.info
5167[Not Vulnerable] gy.ww17.boys4ever.info
5168[Not Vulnerable] helponline.ww17.boys4ever.info
5169[Not Vulnerable] help.ww17.boys4ever.info
5170[Not Vulnerable] helpdesk.ww17.boys4ever.info
5171[Not Vulnerable] hi.ww17.boys4ever.info
5172[Not Vulnerable] gw.ww17.boys4ever.info
5173[Not Vulnerable] hermes.ww17.boys4ever.info
5174[Not Vulnerable] hotjobs.ww17.boys4ever.info170.178.168.203
5175[Not Vulnerable] honolulu.ww17.boys4ever.info
5176[Not Vulnerable] homebase.ww17.boys4ever.info
5177[Not Vulnerable] hobbes.ww17.boys4ever.info
5178[Not Vulnerable] hn.ww17.boys4ever.info
5179[Not Vulnerable] hm.ww17.boys4ever.info
5180[Not Vulnerable] honeypot.ww17.boys4ever.info
5181[Not Vulnerable] host1.ww17.boys4ever.info
5182[Not Vulnerable] host.ww17.boys4ever.info
5183[Not Vulnerable] houstin.ww17.boys4ever.info
5184[Not Vulnerable] hu.ww17.boys4ever.info170.178.168.203
5185[Not Vulnerable] ht.ww17.boys4ever.info
5186[Not Vulnerable] ias.ww17.boys4ever.info
5187[Not Vulnerable] h.ww17.boys4ever.info
5188[Not Vulnerable] hr.ww17.boys4ever.info
5189[Not Vulnerable] http.ww17.boys4ever.info
5190[Not Vulnerable] ia.ww17.boys4ever.info
5191[Not Vulnerable] ida.ww17.boys4ever.info
5192[Not Vulnerable] images.ww17.boys4ever.info
5193[Not Vulnerable] imail.ww17.boys4ever.info
5194[Not Vulnerable] india.ww17.boys4ever.info
5195[Not Vulnerable] img02.ww17.boys4ever.info
5196[Not Vulnerable] inc.ww17.boys4ever.info
5197[Not Vulnerable] imap.ww17.boys4ever.info
5198[Not Vulnerable] img0.ww17.boys4ever.info
5199[Not Vulnerable] indianapolis.ww17.boys4ever.info
5200[Not Vulnerable] im.ww17.boys4ever.info
5201[Not Vulnerable] inside.ww17.boys4ever.info
5202[Not Vulnerable] info.ww17.boys4ever.info
5203[Not Vulnerable] intern.ww17.boys4ever.info
5204[Not Vulnerable] iowa.ww17.boys4ever.info
5205[Not Vulnerable] intranet.ww17.boys4ever.info
5206[Not Vulnerable] investor.ww17.boys4ever.info
5207[Not Vulnerable] in.ww17.boys4ever.info
5208[Not Vulnerable] io.ww17.boys4ever.info
5209[Not Vulnerable] iota.ww17.boys4ever.info
5210[Not Vulnerable] ipsec.ww17.boys4ever.info
5211[Not Vulnerable] ipv6.teredo.ww17.boys4ever.info
5212[Not Vulnerable] iplanet.ww17.boys4ever.info
5213[Not Vulnerable] international.ww17.boys4ever.info
5214[Not Vulnerable] ipv6.ww17.boys4ever.info
5215[Not Vulnerable] iris.ww17.boys4ever.info
5216[Not Vulnerable] irvine.ww17.boys4ever.info
5217[Not Vulnerable] isaserver.ww17.boys4ever.info
5218[Not Vulnerable] isa.ww17.boys4ever.info
5219[Not Vulnerable] isaserv.ww17.boys4ever.info
5220[Not Vulnerable] ircserver.ww17.boys4ever.info
5221[Not Vulnerable] ism.ww17.boys4ever.info
5222[Not Vulnerable] isync.ww17.boys4ever.info
5223[Not Vulnerable] italy.ww17.boys4ever.info
5224[Not Vulnerable] jedi.ww17.boys4ever.info170.178.168.203
5225[Not Vulnerable] jp.ww17.boys4ever.info
5226[Not Vulnerable] ix.ww17.boys4ever.info
5227[Not Vulnerable] jrun.ww17.boys4ever.info
5228[Not Vulnerable] it.ww17.boys4ever.info
5229[Not Vulnerable] juegos.ww17.boys4ever.info
5230[Not Vulnerable] kb.ww17.boys4ever.info
5231[Not Vulnerable] juliette.ww17.boys4ever.info
5232[Not Vulnerable] j.ww17.boys4ever.info
5233[Not Vulnerable] juliet.ww17.boys4ever.info
5234[Not Vulnerable] juniper.ww17.boys4ever.info
5235[Not Vulnerable] km.ww17.boys4ever.info
5236[Not Vulnerable] kg.ww17.boys4ever.info
5237[Not Vulnerable] knowledgebase.ww17.boys4ever.info
5238[Not Vulnerable] knoxville.ww17.boys4ever.info
5239[Not Vulnerable] keynote.ww17.boys4ever.info
5240[Not Vulnerable] kh.ww17.boys4ever.info
5241[Not Vulnerable] koe.ww17.boys4ever.info
5242[Not Vulnerable] kw.ww17.boys4ever.info
5243[Not Vulnerable] ky.ww17.boys4ever.info
5244[Not Vulnerable] kz.ww17.boys4ever.info
5245[Not Vulnerable] ks.ww17.boys4ever.info
5246[Not Vulnerable] linux1.ww17.boys4ever.info170.178.168.203
5247[Not Vulnerable] library.ww17.boys4ever.info
5248[Not Vulnerable] leo.ww17.boys4ever.info
5249[Not Vulnerable] lima.ww17.boys4ever.info
5250[Not Vulnerable] lan.ww17.boys4ever.info
5251[Not Vulnerable] listserv.ww17.boys4ever.info
5252[Not Vulnerable] listserver.ww17.boys4ever.info
5253[Not Vulnerable] labs.ww17.boys4ever.info
5254[Not Vulnerable] lk.ww17.boys4ever.info
5255[Not Vulnerable] lists.ww17.boys4ever.info
5256[Not Vulnerable] laboratory.ww17.boys4ever.info
5257[Not Vulnerable] lb.ww17.boys4ever.info
5258[Not Vulnerable] launch.ww17.boys4ever.info
5259[Not Vulnerable] lab.ww17.boys4ever.info
5260[Not Vulnerable] la.ww17.boys4ever.info
5261[Not Vulnerable] localhost.ww17.boys4ever.info
5262[Not Vulnerable] log02.ww17.boys4ever.info
5263[Not Vulnerable] log01.ww17.boys4ever.info
5264[Not Vulnerable] load.ww17.boys4ever.info
5265[Not Vulnerable] log0.ww17.boys4ever.info
5266[Not Vulnerable] log.ww17.boys4ever.info
5267[Not Vulnerable] log2.ww17.boys4ever.info
5268[Not Vulnerable] logfiles.ww17.boys4ever.info
5269[Not Vulnerable] losangeles.ww17.boys4ever.info
5270[Not Vulnerable] mac10.ww17.boys4ever.info
5271[Not Vulnerable] mach.ww17.boys4ever.info
5272[Not Vulnerable] lr.ww17.boys4ever.info
5273[Not Vulnerable] lyris.ww17.boys4ever.info
5274[Not Vulnerable] lt.ww17.boys4ever.info
5275[Not Vulnerable] louisiana.ww17.boys4ever.info
5276[Not Vulnerable] lotus.ww17.boys4ever.info
5277[Not Vulnerable] ly.ww17.boys4ever.info
5278[Not Vulnerable] mail2.ww17.boys4ever.info
5279[Not Vulnerable] madrid.ww17.boys4ever.info
5280[Not Vulnerable] mailgate.ww17.boys4ever.info
5281[Not Vulnerable] mac1.ww17.boys4ever.info
5282[Not Vulnerable] mailhost.ww17.boys4ever.info170.178.168.203
5283[Not Vulnerable] mailsite.ww17.boys4ever.info
5284[Not Vulnerable] mailserv.ww17.boys4ever.info
5285[Not Vulnerable] maillists.ww17.boys4ever.info
5286[Not Vulnerable] main.ww17.boys4ever.info
5287[Not Vulnerable] mailsrv.ww17.boys4ever.info
5288[Not Vulnerable] maine.ww17.boys4ever.info
5289[Not Vulnerable] manage.ww17.boys4ever.info
5290[Not Vulnerable] map.ww17.boys4ever.info
5291[Not Vulnerable] manufacturing.ww17.boys4ever.info
5292[Not Vulnerable] mars.ww17.boys4ever.info
5293[Not Vulnerable] manager.ww17.boys4ever.info
5294[Not Vulnerable] mci.ww17.boys4ever.info
5295[Not Vulnerable] members.ww17.boys4ever.info
5296[Not Vulnerable] marketing.ww17.boys4ever.info
5297[Not Vulnerable] md.ww17.boys4ever.info
5298[Not Vulnerable] mc.ww17.boys4ever.info
5299[Not Vulnerable] messenger.ww17.boys4ever.info170.178.168.203
5300[Not Vulnerable] memphis.ww17.boys4ever.info
5301[Not Vulnerable] mercury.ww17.boys4ever.info
5302[Not Vulnerable] mall.ww17.boys4ever.info
5303[Not Vulnerable] me.ww17.boys4ever.info
5304[Not Vulnerable] mgmt.ww17.boys4ever.info
5305[Not Vulnerable] minneapolis.ww17.boys4ever.info
5306[Not Vulnerable] mickey.ww17.boys4ever.info
5307[Not Vulnerable] mi.ww17.boys4ever.info
5308[Not Vulnerable] michigan.ww17.boys4ever.info
5309[Not Vulnerable] milwaukee.ww17.boys4ever.info
5310[Not Vulnerable] mis.ww17.boys4ever.info
5311[Not Vulnerable] midwest.ww17.boys4ever.info
5312[Not Vulnerable] mike.ww17.boys4ever.info
5313[Not Vulnerable] minnesota.ww17.boys4ever.info
5314[Not Vulnerable] ml.ww17.boys4ever.info
5315[Not Vulnerable] mk.ww17.boys4ever.info
5316[Not Vulnerable] mn.ww17.boys4ever.info
5317[Not Vulnerable] mobile.ww17.boys4ever.info
5318[Not Vulnerable] mom.ww17.boys4ever.info
5319[Not Vulnerable] monitoring.ww17.boys4ever.info
5320[Not Vulnerable] moscow.ww17.boys4ever.info
5321[Not Vulnerable] mp3.ww17.boys4ever.info
5322[Not Vulnerable] mssql0.ww17.boys4ever.info
5323[Not Vulnerable] mta.ww17.boys4ever.info
5324[Not Vulnerable] mpeg.ww17.boys4ever.info
5325[Not Vulnerable] ms.ww17.boys4ever.info
5326[Not Vulnerable] ms-sql.ww17.boys4ever.info
5327[Not Vulnerable] mp.ww17.boys4ever.info
5328[Not Vulnerable] mssql01.ww17.boys4ever.info
5329[Not Vulnerable] music.ww17.boys4ever.info
5330[Not Vulnerable] mt.ww17.boys4ever.info
5331[Not Vulnerable] mw.ww17.boys4ever.info
5332[Not Vulnerable] m.ww17.boys4ever.info
5333[Not Vulnerable] mz.ww17.boys4ever.info170.178.168.203
5334[Not Vulnerable] my.ww17.boys4ever.info
5335[Not Vulnerable] mysql0.ww17.boys4ever.info
5336[Not Vulnerable] mysql.ww17.boys4ever.info
5337[Not Vulnerable] mx.ww17.boys4ever.info
5338[Not Vulnerable] multimedia.ww17.boys4ever.info
5339[Not Vulnerable] mysql1.ww17.boys4ever.info
5340[Not Vulnerable] nashville.ww17.boys4ever.info
5341[Not Vulnerable] nat.ww17.boys4ever.info
5342[Not Vulnerable] net.ww17.boys4ever.info170.178.168.203
5343[Not Vulnerable] nevada.ww17.boys4ever.info
5344[Not Vulnerable] netscreen.ww17.boys4ever.info
5345[Not Vulnerable] netapp.ww17.boys4ever.info
5346[Not Vulnerable] newjersey.ww17.boys4ever.info
5347[Not Vulnerable] nd.ww17.boys4ever.info
5348[Not Vulnerable] newmexico.ww17.boys4ever.info
5349[Not Vulnerable] network.ww17.boys4ever.info
5350[Not Vulnerable] newton.ww17.boys4ever.info
5351[Not Vulnerable] nms.ww17.boys4ever.info170.178.168.203
5352[Not Vulnerable] newyork.ww17.boys4ever.info
5353[Not Vulnerable] newsfeed.ww17.boys4ever.info
5354[Not Vulnerable] nj.ww17.boys4ever.info
5355[Not Vulnerable] nf.ww17.boys4ever.info
5356[Not Vulnerable] newzealand.ww17.boys4ever.info
5357[Not Vulnerable] ns-.ww17.boys4ever.info
5358[Not Vulnerable] nl.ww17.boys4ever.info
5359[Not Vulnerable] northcarolina.ww17.boys4ever.info
5360[Not Vulnerable] nokia.ww17.boys4ever.info
5361[Not Vulnerable] northeast.ww17.boys4ever.info
5362[Not Vulnerable] northwest.ww17.boys4ever.info
5363[Not Vulnerable] ns2.ww17.boys4ever.info
5364[Not Vulnerable] nt.ww17.boys4ever.info
5365[Not Vulnerable] nv.ww17.boys4ever.info
5366[Not Vulnerable] null.ww17.boys4ever.info
5367[Not Vulnerable] oakland.ww17.boys4ever.info
5368[Not Vulnerable] oklahoma.ww17.boys4ever.info
5369[Not Vulnerable] oh.ww17.boys4ever.info
5370[Not Vulnerable] old.ww17.boys4ever.info
5371[Not Vulnerable] omicron.ww17.boys4ever.info
5372[Not Vulnerable] ocean.ww17.boys4ever.info
5373[Not Vulnerable] om.ww17.boys4ever.info
5374[Not Vulnerable] ontario.ww17.boys4ever.info
5375[Not Vulnerable] ns3.ww17.boys4ever.info
5376[Not Vulnerable] openbsd.ww17.boys4ever.info
5377[Not Vulnerable] ns5.ww17.boys4ever.info
5378[Not Vulnerable] np.ww17.boys4ever.info
5379[Not Vulnerable] ns01.ww17.boys4ever.info
5380[Not Vulnerable] nz.ww17.boys4ever.info
5381[Not Vulnerable] openview.ww17.boys4ever.info
5382[Not Vulnerable] ops01.ww17.boys4ever.info
5383[Not Vulnerable] open.ww17.boys4ever.info
5384[Not Vulnerable] ops02.ww17.boys4ever.info
5385[Not Vulnerable] ops1.ww17.boys4ever.info
5386[Not Vulnerable] novell.ww17.boys4ever.info
5387[Not Vulnerable] ops2.ww17.boys4ever.info
5388[Not Vulnerable] opsware.ww17.boys4ever.info
5389[Not Vulnerable] orange.ww17.boys4ever.info
5390[Not Vulnerable] owa1.ww17.boys4ever.info
5391[Not Vulnerable] out.ww17.boys4ever.info
5392[Not Vulnerable] owa2.ww17.boys4ever.info
5393[Not Vulnerable] order.ww17.boys4ever.info
5394[Not Vulnerable] outgoing.ww17.boys4ever.info
5395[Not Vulnerable] page.ww17.boys4ever.info
5396[Not Vulnerable] outlook.ww17.boys4ever.info
5397[Not Vulnerable] pages.ww17.boys4ever.info
5398[Not Vulnerable] ows.ww17.boys4ever.info
5399[Not Vulnerable] oxnard.ww17.boys4ever.info
5400[Not Vulnerable] owa02.ww17.boys4ever.info
5401[Not Vulnerable] paginas.ww17.boys4ever.info
5402[Not Vulnerable] parners.ww17.boys4ever.info
5403[Not Vulnerable] pbx.ww17.boys4ever.info
5404[Not Vulnerable] pc101.ww17.boys4ever.info
5405[Not Vulnerable] partners.ww17.boys4ever.info
5406[Not Vulnerable] pc01.ww17.boys4ever.info
5407[Not Vulnerable] pa.ww17.boys4ever.info
5408[Not Vulnerable] pc11.ww17.boys4ever.info
5409[Not Vulnerable] pc10.ww17.boys4ever.info
5410[Not Vulnerable] pc12.ww17.boys4ever.info
5411[Not Vulnerable] pc16.ww17.boys4ever.info
5412[Not Vulnerable] pc18.ww17.boys4ever.info
5413[Not Vulnerable] pc1.ww17.boys4ever.info
5414[Not Vulnerable] pc34.ww17.boys4ever.info170.178.168.203
5415[Not Vulnerable] pc32.ww17.boys4ever.info
5416[Not Vulnerable] pc30.ww17.boys4ever.info
5417[Not Vulnerable] pc26.ww17.boys4ever.info
5418[Not Vulnerable] pc23.ww17.boys4ever.info
5419[Not Vulnerable] pc28.ww17.boys4ever.info
5420[Not Vulnerable] pc42.ww17.boys4ever.info
5421[Not Vulnerable] pc41.ww17.boys4ever.info
5422[Not Vulnerable] pc48.ww17.boys4ever.info
5423[Not Vulnerable] pc46.ww17.boys4ever.info
5424[Not Vulnerable] pc49.ww17.boys4ever.info
5425[Not Vulnerable] pc53.ww17.boys4ever.info
5426[Not Vulnerable] pc55.ww17.boys4ever.info
5427[Not Vulnerable] pc35.ww17.boys4ever.info
5428[Not Vulnerable] pc6.ww17.boys4ever.info
5429[Not Vulnerable] pc57.ww17.boys4ever.info
5430[Not Vulnerable] pc59.ww17.boys4ever.info
5431[Not Vulnerable] phi.ww17.boys4ever.info
5432[Not Vulnerable] phoeniz.ww17.boys4ever.info
5433[Not Vulnerable] pc.ww17.boys4ever.info
5434[Not Vulnerable] peoplesoft.ww17.boys4ever.info
5435[Not Vulnerable] philadelphia.ww17.boys4ever.info
5436[Not Vulnerable] pegasus.ww17.boys4ever.info
5437[Not Vulnerable] pc7.ww17.boys4ever.info
5438[Not Vulnerable] personal.ww17.boys4ever.info
5439[Not Vulnerable] pics.ww17.boys4ever.info
5440[Not Vulnerable] pipex-gw.ww17.boys4ever.info
5441[Not Vulnerable] pink.ww17.boys4ever.info
5442[Not Vulnerable] pc50.ww17.boys4ever.info
5443[Not Vulnerable] pix.ww17.boys4ever.info
5444[Not Vulnerable] photos.ww17.boys4ever.info
5445[Not Vulnerable] pki.ww17.boys4ever.info
5446[Not Vulnerable] platinum.ww17.boys4ever.info
5447[Not Vulnerable] pi.ww17.boys4ever.info
5448[Not Vulnerable] plano.ww17.boys4ever.info
5449[Not Vulnerable] portland.ww17.boys4ever.info
5450[Not Vulnerable] postales.ww17.boys4ever.info
5451[Not Vulnerable] phones.ww17.boys4ever.info
5452[Not Vulnerable] pop3.ww17.boys4ever.info
5453[Not Vulnerable] pn.ww17.boys4ever.info
5454[Not Vulnerable] ppp12.ww17.boys4ever.info
5455[Not Vulnerable] po.ww17.boys4ever.info
5456[Not Vulnerable] pictures.ww17.boys4ever.info
5457[Not Vulnerable] ppp1.ww17.boys4ever.info
5458[Not Vulnerable] ppp11.ww17.boys4ever.info
5459[Not Vulnerable] ppp19.ww17.boys4ever.info
5460[Not Vulnerable] ppp4.ww17.boys4ever.info
5461[Not Vulnerable] ppp20.ww17.boys4ever.info
5462[Not Vulnerable] ppp9.ww17.boys4ever.info
5463[Not Vulnerable] pptp.ww17.boys4ever.info
5464[Not Vulnerable] ppp8.ww17.boys4ever.info
5465[Not Vulnerable] ppp5.ww17.boys4ever.info
5466[Not Vulnerable] printserv.ww17.boys4ever.info
5467[Not Vulnerable] printer.ww17.boys4ever.info
5468[Not Vulnerable] projects.ww17.boys4ever.info
5469[Not Vulnerable] prensa.ww17.boys4ever.info
5470[Not Vulnerable] printserver.ww17.boys4ever.info
5471[Not Vulnerable] priv.ww17.boys4ever.info
5472[Not Vulnerable] psi.ww17.boys4ever.info
5473[Not Vulnerable] project.ww17.boys4ever.info
5474[Not Vulnerable] promo.ww17.boys4ever.info
5475[Not Vulnerable] ppp18.ww17.boys4ever.info
5476[Not Vulnerable] portals.ww17.boys4ever.info
5477[Not Vulnerable] pt.ww17.boys4ever.info
5478[Not Vulnerable] public.ww17.boys4ever.info
5479[Not Vulnerable] qa.ww17.boys4ever.info
5480[Not Vulnerable] ps.ww17.boys4ever.info
5481[Not Vulnerable] ras.ww17.boys4ever.info
5482[Not Vulnerable] r1.ww17.boys4ever.info
5483[Not Vulnerable] purple.ww17.boys4ever.info
5484[Not Vulnerable] raptor.ww17.boys4ever.info
5485[Not Vulnerable] recruiting.ww17.boys4ever.info
5486[Not Vulnerable] registry.ww17.boys4ever.info
5487[Not Vulnerable] ref.ww17.boys4ever.info
5488[Not Vulnerable] reference.ww17.boys4ever.info
5489[Not Vulnerable] regs.ww17.boys4ever.info
5490[Not Vulnerable] red.ww17.boys4ever.info
5491[Not Vulnerable] redhat.ww17.boys4ever.info
5492[Not Vulnerable] reg.ww17.boys4ever.info
5493[Not Vulnerable] relay.ww17.boys4ever.info
5494[Not Vulnerable] reserved.ww17.boys4ever.info
5495[Not Vulnerable] remote.ww17.boys4ever.info
5496[Not Vulnerable] research.ww17.boys4ever.info
5497[Not Vulnerable] router.ww17.boys4ever.info
5498[Not Vulnerable] ri.ww17.boys4ever.info
5499[Not Vulnerable] resumenes.ww17.boys4ever.info
5500[Not Vulnerable] romeo.ww17.boys4ever.info
5501[Not Vulnerable] root.ww17.boys4ever.info
5502[Not Vulnerable] route.ww17.boys4ever.info
5503[Not Vulnerable] rtelnet.ww17.boys4ever.info
5504[Not Vulnerable] rs.ww17.boys4ever.info
5505[Not Vulnerable] rtr01.ww17.boys4ever.info
5506[Not Vulnerable] rune.ww17.boys4ever.info
5507[Not Vulnerable] ru.ww17.boys4ever.info
5508[Not Vulnerable] rwhois.ww17.boys4ever.info
5509[Not Vulnerable] s1.ww17.boys4ever.info
5510[Not Vulnerable] sac.ww17.boys4ever.info
5511[Not Vulnerable] sadmin.ww17.boys4ever.info
5512[Not Vulnerable] safe.ww17.boys4ever.info
5513[Not Vulnerable] sa.ww17.boys4ever.info
5514[Not Vulnerable] sanantonio.ww17.boys4ever.info
5515[Not Vulnerable] sanjose.ww17.boys4ever.info
5516[Not Vulnerable] saskatchewan.ww17.boys4ever.info
5517[Not Vulnerable] sbs.ww17.boys4ever.info
5518[Not Vulnerable] scanner.ww17.boys4ever.info
5519[Not Vulnerable] schedules.ww17.boys4ever.info
5520[Not Vulnerable] scotty.ww17.boys4ever.info
5521[Not Vulnerable] sc.ww17.boys4ever.info
5522[Not Vulnerable] sd.ww17.boys4ever.info
5523[Not Vulnerable] secured.ww17.boys4ever.info
5524[Not Vulnerable] seattle.ww17.boys4ever.info
5525[Not Vulnerable] security.ww17.boys4ever.info
5526[Not Vulnerable] serv2.ww17.boys4ever.info
5527[Not Vulnerable] seri.ww17.boys4ever.info
5528[Not Vulnerable] serv.ww17.boys4ever.info
5529[Not Vulnerable] shareware.ww17.boys4ever.info
5530[Not Vulnerable] shared.ww17.boys4ever.info
5531[Not Vulnerable] shoppers.ww17.boys4ever.info
5532[Not Vulnerable] shopping.ww17.boys4ever.info
5533[Not Vulnerable] se.ww17.boys4ever.info
5534[Not Vulnerable] shop.ww17.boys4ever.info
5535[Not Vulnerable] sh.ww17.boys4ever.info
5536[Not Vulnerable] servidor.ww17.boys4ever.info
5537[Not Vulnerable] sim.ww17.boys4ever.info
5538[Not Vulnerable] signup.ww17.boys4ever.info
5539[Not Vulnerable] sl.ww17.boys4ever.info
5540[Not Vulnerable] sj.ww17.boys4ever.info
5541[Not Vulnerable] slmail.ww17.boys4ever.info
5542[Not Vulnerable] si.ww17.boys4ever.info
5543[Not Vulnerable] snmpd.ww17.boys4ever.info
5544[Not Vulnerable] snmp.ww17.boys4ever.info
5545[Not Vulnerable] smtp.ww17.boys4ever.info
5546[Not Vulnerable] smc.ww17.boys4ever.info
5547[Not Vulnerable] sniffer.ww17.boys4ever.info
5548[Not Vulnerable] sn.ww17.boys4ever.info
5549[Not Vulnerable] southwest.ww17.boys4ever.info
5550[Not Vulnerable] so.ww17.boys4ever.info
5551[Not Vulnerable] southeast.ww17.boys4ever.info
5552[Not Vulnerable] spain.ww17.boys4ever.info
5553[Not Vulnerable] sourcesafe.ww17.boys4ever.info
5554[Not Vulnerable] spam.ww17.boys4ever.info
5555[Not Vulnerable] spiderman.ww17.boys4ever.info
5556[Not Vulnerable] spock.ww17.boys4ever.info
5557[Not Vulnerable] spokane.ww17.boys4ever.info
5558[Not Vulnerable] ssl1.ww17.boys4ever.info
5559[Not Vulnerable] ss.ww17.boys4ever.info
5560[Not Vulnerable] southcarolina.ww17.boys4ever.info
5561[Not Vulnerable] sol.ww17.boys4ever.info
5562[Not Vulnerable] sql1.ww17.boys4ever.info
5563[Not Vulnerable] staff.ww17.boys4ever.info
5564[Not Vulnerable] software.ww17.boys4ever.info
5565[Not Vulnerable] sqa.ww17.boys4ever.info
5566[Not Vulnerable] sprint.ww17.boys4ever.info
5567[Not Vulnerable] ssh.ww17.boys4ever.info
5568[Not Vulnerable] stlouis.ww17.boys4ever.info
5569[Not Vulnerable] static.ww17.boys4ever.info
5570[Not Vulnerable] stats.ww17.boys4ever.info
5571[Not Vulnerable] statistics.ww17.boys4ever.info
5572[Not Vulnerable] stock.ww17.boys4ever.info
5573[Not Vulnerable] storefront.ww17.boys4ever.info
5574[Not Vulnerable] store.ww17.boys4ever.info
5575[Not Vulnerable] storage.ww17.boys4ever.info
5576[Not Vulnerable] start.ww17.boys4ever.info
5577[Not Vulnerable] sql0.ww17.boys4ever.info
5578[Not Vulnerable] streaming.ww17.boys4ever.info
5579[Not Vulnerable] st.ww17.boys4ever.info
5580[Not Vulnerable] submit.ww17.boys4ever.info
5581[Not Vulnerable] sun0.ww17.boys4ever.info
5582[Not Vulnerable] strongmail.ww17.boys4ever.info
5583[Not Vulnerable] sun2.ww17.boys4ever.info
5584[Not Vulnerable] sun.ww17.boys4ever.info
5585[Not Vulnerable] supplier.ww17.boys4ever.info
5586[Not Vulnerable] superman.ww17.boys4ever.info
5587[Not Vulnerable] studio.ww17.boys4ever.info
5588[Not Vulnerable] sv.ww17.boys4ever.info
5589[Not Vulnerable] support.ww17.boys4ever.info
5590[Not Vulnerable] sw01.ww17.boys4ever.info
5591[Not Vulnerable] sybase.ww17.boys4ever.info
5592[Not Vulnerable] sysadmin.ww17.boys4ever.info
5593[Not Vulnerable] switch.ww17.boys4ever.info
5594[Not Vulnerable] s.ww17.boys4ever.info
5595[Not Vulnerable] sw0.ww17.boys4ever.info
5596[Not Vulnerable] sw.ww17.boys4ever.info
5597[Not Vulnerable] td.ww17.boys4ever.info170.178.168.203
5598[Not Vulnerable] taiwan.ww17.boys4ever.info
5599[Not Vulnerable] tacoma.ww17.boys4ever.info
5600[Not Vulnerable] sy.ww17.boys4ever.info
5601[Not Vulnerable] sysback.ww17.boys4ever.info
5602[Not Vulnerable] tcl.ww17.boys4ever.info
5603[Not Vulnerable] tampa.ww17.boys4ever.info
5604[Not Vulnerable] tc.ww17.boys4ever.info
5605[Not Vulnerable] team.ww17.boys4ever.info
5606[Not Vulnerable] telephone.ww17.boys4ever.info
5607[Not Vulnerable] tennessee.ww17.boys4ever.info
5608[Not Vulnerable] terminal.ww17.boys4ever.info
5609[Not Vulnerable] termserv.ww17.boys4ever.info
5610[Not Vulnerable] testsite.ww17.boys4ever.info
5611[Not Vulnerable] testajax.ww17.boys4ever.info
5612[Not Vulnerable] testphp.ww17.boys4ever.info
5613[Not Vulnerable] test.ww17.boys4ever.info
5614[Not Vulnerable] testserver.ww17.boys4ever.info
5615[Not Vulnerable] testlab.ww17.boys4ever.info
5616[Not Vulnerable] testcf.ww17.boys4ever.info
5617[Not Vulnerable] testxp.ww17.boys4ever.info
5618[Not Vulnerable] texas.ww17.boys4ever.info
5619[Not Vulnerable] tn.ww17.boys4ever.info
5620[Not Vulnerable] thailand.ww17.boys4ever.info
5621[Not Vulnerable] tm.ww17.boys4ever.info
5622[Not Vulnerable] tienda.ww17.boys4ever.info
5623[Not Vulnerable] tokyo.ww17.boys4ever.info
5624[Not Vulnerable] tom.ww17.boys4ever.info
5625[Not Vulnerable] training.ww17.boys4ever.info
5626[Not Vulnerable] trinidad.ww17.boys4ever.info
5627[Not Vulnerable] train.ww17.boys4ever.info
5628[Not Vulnerable] ts.ww17.boys4ever.info
5629[Not Vulnerable] tucson.ww17.boys4ever.info
5630[Not Vulnerable] tw.ww17.boys4ever.info
5631[Not Vulnerable] tulsa.ww17.boys4ever.info
5632[Not Vulnerable] ts1.ww17.boys4ever.info
5633[Not Vulnerable] tx.ww17.boys4ever.info
5634[Not Vulnerable] updates.ww17.boys4ever.info
5635[Not Vulnerable] uniform.ww17.boys4ever.info
5636[Not Vulnerable] upload.ww17.boys4ever.info
5637[Not Vulnerable] utilities.ww17.boys4ever.info170.178.168.203
5638[Not Vulnerable] urchin.ww17.boys4ever.info
5639[Not Vulnerable] upsilon.ww17.boys4ever.info
5640[Not Vulnerable] v6.ww17.boys4ever.info
5641[Not Vulnerable] us.ww17.boys4ever.info
5642[Not Vulnerable] uy.ww17.boys4ever.info
5643[Not Vulnerable] usa.ww17.boys4ever.info
5644[Not Vulnerable] utah.ww17.boys4ever.info
5645[Not Vulnerable] usenet.ww17.boys4ever.info
5646[Not Vulnerable] vault.ww17.boys4ever.info
5647[Not Vulnerable] vantive.ww17.boys4ever.info
5648[Not Vulnerable] va.ww17.boys4ever.info
5649[Not Vulnerable] vermont.ww17.boys4ever.info
5650[Not Vulnerable] ve.ww17.boys4ever.info
5651[Not Vulnerable] vend.ww17.boys4ever.info
5652[Not Vulnerable] venus.ww17.boys4ever.info
5653[Not Vulnerable] viking.ww17.boys4ever.info
5654[Not Vulnerable] videos.ww17.boys4ever.info
5655[Not Vulnerable] vip.ww17.boys4ever.info
5656[Not Vulnerable] violet.ww17.boys4ever.info
5657[Not Vulnerable] voyager.ww17.boys4ever.info
5658[Not Vulnerable] vmware.ww17.boys4ever.info
5659[Not Vulnerable] vn.ww17.boys4ever.info
5660[Not Vulnerable] vpn1.ww17.boys4ever.info
5661[Not Vulnerable] vpn01.ww17.boys4ever.info
5662[Not Vulnerable] vpn.ww17.boys4ever.info
5663[Not Vulnerable] vpn0.ww17.boys4ever.info
5664[Not Vulnerable] w1.ww17.boys4ever.info
5665[Not Vulnerable] vt.ww17.boys4ever.info
5666[Not Vulnerable] vpn02.ww17.boys4ever.info
5667[Not Vulnerable] w2.ww17.boys4ever.info
5668[Not Vulnerable] vega.ww17.boys4ever.info
5669[Not Vulnerable] w3.ww17.boys4ever.info
5670[Not Vulnerable] webboard.ww17.boys4ever.info
5671[Not Vulnerable] warehouse.ww17.boys4ever.info
5672[Not Vulnerable] wa.ww17.boys4ever.info
5673[Not Vulnerable] webcam.ww17.boys4ever.info
5674[Not Vulnerable] wais.ww17.boys4ever.info
5675[Not Vulnerable] wc3.ww17.boys4ever.info
5676[Not Vulnerable] webfarm.ww17.boys4ever.info
5677[Not Vulnerable] weblib.ww17.boys4ever.info
5678[Not Vulnerable] webhelp.ww17.boys4ever.info
5679[Not Vulnerable] webmaster.ww17.boys4ever.info
5680[Not Vulnerable] webproxy.ww17.boys4ever.info
5681[Not Vulnerable] windows01.ww17.boys4ever.info170.178.168.203
5682[Not Vulnerable] websvr.ww17.boys4ever.info
5683[Not Vulnerable] website.ww17.boys4ever.info
5684[Not Vulnerable] westvirginia.ww17.boys4ever.info
5685[Not Vulnerable] websphere.ww17.boys4ever.info
5686[Not Vulnerable] webtrends.ww17.boys4ever.info
5687[Not Vulnerable] welcome.ww17.boys4ever.info
5688[Not Vulnerable] wf.ww17.boys4ever.info
5689[Not Vulnerable] webs.ww17.boys4ever.info
5690[Not Vulnerable] win1.ww17.boys4ever.info
5691[Not Vulnerable] wiki.ww17.boys4ever.info
5692[Not Vulnerable] whois.ww17.boys4ever.info
5693[Not Vulnerable] white.ww17.boys4ever.info
5694[Not Vulnerable] win2k3.ww17.boys4ever.info
5695[Not Vulnerable] windows2.ww17.boys4ever.info170.178.168.203
5696[Not Vulnerable] wingate.ww17.boys4ever.info
5697[Not Vulnerable] winproxy.ww17.boys4ever.info
5698[Not Vulnerable] wlan.ww17.boys4ever.info170.178.168.203
5699[Not Vulnerable] windows2003.ww17.boys4ever.info
5700[Not Vulnerable] wins.ww17.boys4ever.info
5701[Not Vulnerable] win.ww17.boys4ever.info
5702[Not Vulnerable] ws5.ww17.boys4ever.info170.178.168.203
5703[Not Vulnerable] wisconsin.ww17.boys4ever.info
5704[Not Vulnerable] ws12.ww17.boys4ever.info
5705[Not Vulnerable] wordpress.ww17.boys4ever.info
5706[Not Vulnerable] wire.ww17.boys4ever.info
5707[Not Vulnerable] ws10.ww17.boys4ever.info
5708[Not Vulnerable] ws4.ww17.boys4ever.info
5709[Not Vulnerable] ww17.boys4ever.info
5710[Not Vulnerable] ws13.ww17.boys4ever.info
5711[Not Vulnerable] wusage.ww17.boys4ever.info
5712[Not Vulnerable] www-01.ww17.boys4ever.info
5713[Not Vulnerable] ws2.ww17.boys4ever.info
5714[Not Vulnerable] www-.ww17.boys4ever.info
5715[Not Vulnerable] www02.ww17.boys4ever.info
5716[Not Vulnerable] www01.ww17.boys4ever.info
5717[Not Vulnerable] w.ww17.boys4ever.info
5718[Not Vulnerable] www0.ww17.boys4ever.info
5719[Not Vulnerable] www1.ww17.boys4ever.info
5720[Not Vulnerable] wwwchat.ww17.boys4ever.info
5721[Not Vulnerable] ww.ww17.boys4ever.info
5722[Not Vulnerable] www3.ww17.boys4ever.info
5723[Not Vulnerable] wyoming.ww17.boys4ever.info
5724[Not Vulnerable] www.ww17.boys4ever.info
5725[Not Vulnerable] wwwmail.ww17.boys4ever.info
5726[Not Vulnerable] xlogan.ww17.boys4ever.info
5727[Not Vulnerable] xml.ww17.boys4ever.info
5728[Not Vulnerable] y.ww17.boys4ever.info
5729[Not Vulnerable] zw.ww17.boys4ever.info
5730[Not Vulnerable] young.ww17.boys4ever.info
5731[Not Vulnerable] z.ww17.boys4ever.info
5732[Not Vulnerable] zebra.ww17.boys4ever.info
5733[Not Vulnerable] zulu.ww17.boys4ever.info
5734[Not Vulnerable] z-log.ww17.boys4ever.info
5735##################################################################################################################################
5736WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
5737Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:42 EST
5738Nmap scan report for ww17.boys4ever.info (199.191.50.92)
5739Host is up (0.50s latency).
5740Not shown: 490 filtered ports, 4 closed ports
5741Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5742PORT STATE SERVICE
574353/tcp open domain
574480/tcp open http
5745
5746Nmap done: 1 IP address (1 host up) scanned in 46.46 seconds
5747##################################################################################################################################
5748Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:43 EST
5749Nmap scan report for ww17.boys4ever.info (199.191.50.92)
5750Host is up (0.37s latency).
5751Not shown: 2 filtered ports
5752PORT STATE SERVICE
575353/udp open|filtered domain
575467/udp open|filtered dhcps
575568/udp open|filtered dhcpc
575669/udp open|filtered tftp
575788/udp open|filtered kerberos-sec
5758123/udp open|filtered ntp
5759139/udp open|filtered netbios-ssn
5760161/udp open|filtered snmp
5761162/udp open|filtered snmptrap
5762389/udp open|filtered ldap
5763500/udp open|filtered isakmp
5764520/udp open|filtered route
57652049/udp open|filtered nfs
5766
5767Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds
5768##################################################################################################################################
5769Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:43 EST
5770NSE: Loaded 64 scripts for scanning.
5771NSE: Script Pre-scanning.
5772Initiating NSE at 16:43
5773Completed NSE at 16:43, 0.00s elapsed
5774Initiating NSE at 16:43
5775Completed NSE at 16:43, 0.00s elapsed
5776Initiating Parallel DNS resolution of 1 host. at 16:43
5777Completed Parallel DNS resolution of 1 host. at 16:43, 0.02s elapsed
5778Initiating SYN Stealth Scan at 16:43
5779Scanning ww17.boys4ever.info (199.191.50.92) [1 port]
5780Discovered open port 53/tcp on 199.191.50.92
5781Completed SYN Stealth Scan at 16:43, 0.66s elapsed (1 total ports)
5782Initiating Service scan at 16:43
5783Scanning 1 service on ww17.boys4ever.info (199.191.50.92)
5784Completed Service scan at 16:43, 1.07s elapsed (1 service on 1 host)
5785Initiating OS detection (try #1) against ww17.boys4ever.info (199.191.50.92)
5786Retrying OS detection (try #2) against ww17.boys4ever.info (199.191.50.92)
5787Initiating Traceroute at 16:43
5788Completed Traceroute at 16:43, 2.59s elapsed
5789Initiating Parallel DNS resolution of 17 hosts. at 16:43
5790Completed Parallel DNS resolution of 17 hosts. at 16:44, 14.22s elapsed
5791NSE: Script scanning 199.191.50.92.
5792Initiating NSE at 16:44
5793Completed NSE at 16:44, 8.76s elapsed
5794Initiating NSE at 16:44
5795Completed NSE at 16:44, 0.00s elapsed
5796Nmap scan report for ww17.boys4ever.info (199.191.50.92)
5797Host is up (0.55s latency).
5798
5799PORT STATE SERVICE VERSION
580053/tcp open tcpwrapped
5801|_dns-fuzz: Server didn't response to our probe, can't fuzz
5802| dns-nsec-enum:
5803|_ No NSEC records found
5804| dns-nsec3-enum:
5805|_ DNSSEC NSEC3 not supported
5806Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5807Device type: general purpose|specialized|storage-misc
5808Running (JUST GUESSING): Linux 4.X|3.X (91%), Crestron 2-Series (87%), HP embedded (85%)
5809OS CPE: cpe:/o:linux:linux_kernel:4.10 cpe:/o:crestron:2_series cpe:/o:linux:linux_kernel:3.16 cpe:/h:hp:p2000_g3
5810Aggressive OS guesses: Linux 4.10 (91%), Crestron XPanel control system (87%), Linux 3.16 (86%), HP P2000 G3 NAS device (85%)
5811No exact OS matches for host (test conditions non-ideal).
5812Uptime guess: 0.000 days (since Mon Feb 10 16:43:48 2020)
5813Network Distance: 20 hops
5814
5815Host script results:
5816| dns-brute:
5817| DNS Brute-force hostnames:
5818| admin.boys4ever.info - 70.32.1.32
5819| host.boys4ever.info - 70.32.1.32
5820| stats.boys4ever.info - 70.32.1.32
5821| devel.boys4ever.info - 170.178.168.203
5822| mx.boys4ever.info - 70.32.1.32
5823| administration.boys4ever.info - 70.32.1.32
5824| http.boys4ever.info - 170.178.168.203
5825| svn.boys4ever.info - 70.32.1.32
5826| development.boys4ever.info - 170.178.168.203
5827| mx0.boys4ever.info - 70.32.1.32
5828| ads.boys4ever.info - 170.178.168.203
5829| id.boys4ever.info - 170.178.168.203
5830| syslog.boys4ever.info - 170.178.168.203
5831| devsql.boys4ever.info - 70.32.1.32
5832| mx1.boys4ever.info - 70.32.1.32
5833| adserver.boys4ever.info - 170.178.168.203
5834| images.boys4ever.info - 170.178.168.203
5835| test.boys4ever.info - 70.32.1.32
5836| devtest.boys4ever.info - 170.178.168.203
5837| mysql.boys4ever.info - 70.32.1.32
5838| alerts.boys4ever.info - 70.32.1.32
5839| info.boys4ever.info - 170.178.168.203
5840| test1.boys4ever.info - 170.178.168.203
5841| dhcp.boys4ever.info - 170.178.168.203
5842| news.boys4ever.info - 70.32.1.32
5843| alpha.boys4ever.info - 170.178.168.203
5844| internal.boys4ever.info - 170.178.168.203
5845| test2.boys4ever.info - 170.178.168.203
5846| direct.boys4ever.info - 170.178.168.203
5847| noc.boys4ever.info - 170.178.168.203
5848| ap.boys4ever.info - 170.178.168.203
5849| internet.boys4ever.info - 170.178.168.203
5850| testing.boys4ever.info - 170.178.168.203
5851| dmz.boys4ever.info - 70.32.1.32
5852| ns.boys4ever.info - 170.178.168.203
5853| apache.boys4ever.info - 70.32.1.32
5854| intra.boys4ever.info - 70.32.1.32
5855| upload.boys4ever.info - 170.178.168.203
5856| dns.boys4ever.info - 70.32.1.32
5857| ns0.boys4ever.info - 70.32.1.32
5858| app.boys4ever.info - 70.32.1.32
5859| intranet.boys4ever.info - 170.178.168.203
5860| vm.boys4ever.info - 170.178.168.203
5861| dns0.boys4ever.info - 170.178.168.203
5862| ns1.boys4ever.info - 170.178.168.203
5863| apps.boys4ever.info - 170.178.168.203
5864| ipv6.boys4ever.info - 70.32.1.32
5865| vnc.boys4ever.info - 170.178.168.203
5866| dns1.boys4ever.info - 70.32.1.32
5867| ns2.boys4ever.info - 70.32.1.32
5868| appserver.boys4ever.info - 170.178.168.203
5869| lab.boys4ever.info - 170.178.168.203
5870| voip.boys4ever.info - 170.178.168.203
5871| dns2.boys4ever.info - 170.178.168.203
5872| ns3.boys4ever.info - 70.32.1.32
5873| aptest.boys4ever.info - 70.32.1.32
5874| ldap.boys4ever.info - 70.32.1.32
5875| vpn.boys4ever.info - 70.32.1.32
5876| download.boys4ever.info - 70.32.1.32
5877| ntp.boys4ever.info - 70.32.1.32
5878| auth.boys4ever.info - 170.178.168.203
5879| linux.boys4ever.info - 70.32.1.32
5880| web.boys4ever.info - 70.32.1.32
5881| en.boys4ever.info - 170.178.168.203
5882| ops.boys4ever.info - 70.32.1.32
5883| backup.boys4ever.info - 70.32.1.32
5884| local.boys4ever.info - 170.178.168.203
5885| web2test.boys4ever.info - 170.178.168.203
5886| erp.boys4ever.info - 70.32.1.32
5887| oracle.boys4ever.info - 170.178.168.203
5888| beta.boys4ever.info - 70.32.1.32
5889| log.boys4ever.info - 70.32.1.32
5890| whois.boys4ever.info - 170.178.168.203
5891| eshop.boys4ever.info - 70.32.1.32
5892| owa.boys4ever.info - 170.178.168.203
5893| blog.boys4ever.info - 170.178.168.203
5894| mail.boys4ever.info - 70.32.1.32
5895| wiki.boys4ever.info - 70.32.1.32
5896| exchange.boys4ever.info - 70.32.1.32
5897| pbx.boys4ever.info - 170.178.168.203
5898| cdn.boys4ever.info - 70.32.1.32
5899| mail2.boys4ever.info - 70.32.1.32
5900| www.boys4ever.info - 70.32.1.32
5901| f5.boys4ever.info - 170.178.168.203
5902| s3.boys4ever.info - 70.32.1.32
5903| chat.boys4ever.info - 70.32.1.32
5904| mail3.boys4ever.info - 170.178.168.203
5905| www2.boys4ever.info - 70.32.1.32
5906| fileserver.boys4ever.info - 170.178.168.203
5907| secure.boys4ever.info - 70.32.1.32
5908| citrix.boys4ever.info - 70.32.1.32
5909| mailgate.boys4ever.info - 170.178.168.203
5910| xml.boys4ever.info - 70.32.1.32
5911| firewall.boys4ever.info - 70.32.1.32
5912| server.boys4ever.info - 70.32.1.32
5913| cms.boys4ever.info - 70.32.1.32
5914| main.boys4ever.info - 70.32.1.32
5915| forum.boys4ever.info - 170.178.168.203
5916| shop.boys4ever.info - 170.178.168.203
5917| corp.boys4ever.info - 70.32.1.32
5918| manage.boys4ever.info - 70.32.1.32
5919| ftp.boys4ever.info - 70.32.1.32
5920| sip.boys4ever.info - 70.32.1.32
5921| crs.boys4ever.info - 170.178.168.203
5922| mgmt.boys4ever.info - 170.178.168.203
5923| ftp0.boys4ever.info - 70.32.1.32
5924| smtp.boys4ever.info - 70.32.1.32
5925| cvs.boys4ever.info - 70.32.1.32
5926| mirror.boys4ever.info - 170.178.168.203
5927| git.boys4ever.info - 170.178.168.203
5928| sql.boys4ever.info - 70.32.1.32
5929| database.boys4ever.info - 70.32.1.32
5930| mobile.boys4ever.info - 70.32.1.32
5931| gw.boys4ever.info - 70.32.1.32
5932| squid.boys4ever.info - 170.178.168.203
5933| db.boys4ever.info - 70.32.1.32
5934| monitor.boys4ever.info - 70.32.1.32
5935| help.boys4ever.info - 70.32.1.32
5936| ssh.boys4ever.info - 170.178.168.203
5937| demo.boys4ever.info - 170.178.168.203
5938| mssql.boys4ever.info - 70.32.1.32
5939| helpdesk.boys4ever.info - 70.32.1.32
5940| ssl.boys4ever.info - 70.32.1.32
5941| dev.boys4ever.info - 170.178.168.203
5942| mta.boys4ever.info - 170.178.168.203
5943| home.boys4ever.info - 170.178.168.203
5944|_ stage.boys4ever.info - 170.178.168.203
5945
5946TRACEROUTE (using port 53/tcp)
5947HOP RTT ADDRESS
59481 453.18 ms 10.246.204.1
59492 453.25 ms 160.116.0.161
59503 453.23 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
59514 453.25 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
59525 453.39 ms bzq-219-189-6.dsl.bezeqint.net (62.219.189.6)
59536 453.41 ms bzq-219-189-73.dsl.bezeqint.net (62.219.189.73)
59547 453.40 ms bzq-219-189-10.dsl.bezeqint.net (62.219.189.10)
59558 453.45 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
59569 663.21 ms ae5.cs3.lga5.us.eth.zayo.com (64.125.29.126)
595710 577.88 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
595811 685.34 ms ae5.cs3.lga5.us.eth.zayo.com (64.125.29.126)
595912 685.35 ms ae4.cs2.dca2.us.eth.zayo.com (64.125.29.31)
596013 685.26 ms ae3.cs2.iah1.us.eth.zayo.com (64.125.29.45)
596114 685.31 ms ae2.mpr2.aus1.us.zip.zayo.com (64.125.31.250)
596215 685.21 ms ae3.cs2.iah1.us.eth.zayo.com (64.125.29.45)
596316 685.32 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
596417 685.25 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
596518 685.25 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
596619 541.34 ms po10.gw2.pod1.tx1.datafoundry.net (209.99.14.106)
596720 639.41 ms 199.191.50.92
5968
5969NSE: Script Post-scanning.
5970Initiating NSE at 16:44
5971Completed NSE at 16:44, 0.00s elapsed
5972Initiating NSE at 16:44
5973Completed NSE at 16:44, 0.00s elapsed
5974###################################################################################################################################
5975http://ww17.boys4ever.info [200 OK] Apache, Cookies[vsid], Country[RESERVED][ZZ], Frame, HTTPServer[Apache], HttpOnly[vsid], IP[199.191.50.92], Script[text/javascript], UncommonHeaders[x-adblock-key,ntcoent-length], X-UA-Compatible[IE=EmulateIE7]
5976###################################################################################################################################
5977===============================================================
5978Gobuster v3.0.1
5979by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
5980===============================================================
5981[+] Url: http://ww17.boys4ever.info
5982[+] Threads: 10
5983[+] Wordlist: /usr/share/sniper/wordlists/vhosts.txt
5984[+] User Agent: gobuster/3.0.1
5985[+] Timeout: 10s
5986===============================================================
59872020/02/10 16:46:44 Starting gobuster
5988===============================================================
5989Found: 127.0.0.1.ww17.boys4ever.info (Status: 200) [Size: 1972]
5990Found: admin.ww17.boys4ever.info (Status: 200) [Size: 1996]
5991Found: administration.ww17.boys4ever.info (Status: 200) [Size: 2009]
5992Found: ap.ww17.boys4ever.info (Status: 200) [Size: 1895]
5993Found: api.ww17.boys4ever.info (Status: 200) [Size: 2002]
5994Found: adserver.ww17.boys4ever.info (Status: 200) [Size: 1967]
5995Found: app.ww17.boys4ever.info (Status: 200) [Size: 2002]
5996Found: apache.ww17.boys4ever.info (Status: 200) [Size: 9655]
5997Found: ads.ww17.boys4ever.info (Status: 200) [Size: 1962]
5998Found: alerts.ww17.boys4ever.info (Status: 200) [Size: 1991]
5999Found: appserver.ww17.boys4ever.info (Status: 200) [Size: 1976]
6000Found: apps.ww17.boys4ever.info (Status: 200) [Size: 1975]
6001Found: backup.ww17.boys4ever.info (Status: 200) [Size: 1989]
6002Found: aptest.ww17.boys4ever.info (Status: 200) [Size: 1973]
6003Found: auth.ww17.boys4ever.info (Status: 200) [Size: 1989]
6004Found: alpha.ww17.boys4ever.info (Status: 200) [Size: 9662]
6005Found: cdn.ww17.boys4ever.info (Status: 200) [Size: 1980]
6006Found: blog.ww17.boys4ever.info (Status: 200) [Size: 9637]
6007Found: beta.ww17.boys4ever.info (Status: 200) [Size: 1951]
6008Found: chat.ww17.boys4ever.info (Status: 200) [Size: 1983]
6009Found: citrix.ww17.boys4ever.info (Status: 200) [Size: 9633]
6010Found: corp.ww17.boys4ever.info (Status: 200) [Size: 1979]
6011Found: cms.ww17.boys4ever.info (Status: 200) [Size: 1974]
6012Found: crs.ww17.boys4ever.info (Status: 200) [Size: 9646]
6013Found: dashboard.ww17.boys4ever.info (Status: 200) [Size: 2010]
6014Found: cvs.ww17.boys4ever.info (Status: 200) [Size: 1990]
6015Found: db.ww17.boys4ever.info (Status: 200) [Size: 9555]
6016Found: database.ww17.boys4ever.info (Status: 200) [Size: 1989]
6017Found: demo.ww17.boys4ever.info (Status: 200) [Size: 1981]
6018Found: dev.ww17.boys4ever.info (Status: 200) [Size: 1978]
6019Found: devel.ww17.boys4ever.info (Status: 200) [Size: 1976]
6020Found: development.ww17.boys4ever.info (Status: 200) [Size: 1982]
6021Found: devsql.ww17.boys4ever.info (Status: 200) [Size: 9619]
6022Found: direct.ww17.boys4ever.info (Status: 200) [Size: 1979]
6023Found: dhcp.ww17.boys4ever.info (Status: 200) [Size: 1991]
6024Found: dns0.ww17.boys4ever.info (Status: 200) [Size: 1961]
6025Found: dns.ww17.boys4ever.info (Status: 200) [Size: 1988]
6026Found: dns2.ww17.boys4ever.info (Status: 200) [Size: 1981]
6027Found: download.ww17.boys4ever.info (Status: 200) [Size: 1981]
6028Found: devtest.ww17.boys4ever.info (Status: 200) [Size: 9692]
6029Found: dmz.ww17.boys4ever.info (Status: 200) [Size: 9618]
6030Found: erp.ww17.boys4ever.info (Status: 200) [Size: 1964]
6031Found: en.ww17.boys4ever.info (Status: 200) [Size: 1889]
6032Found: eshop.ww17.boys4ever.info (Status: 200) [Size: 1992]
6033Found: dns1.ww17.boys4ever.info (Status: 200) [Size: 9627]
6034Found: exchange.ww17.boys4ever.info (Status: 200) [Size: 2011]
6035Found: f5.ww17.boys4ever.info (Status: 200) [Size: 1873]
6036Found: firewall.ww17.boys4ever.info (Status: 200) [Size: 1993]
6037Found: fileserver.ww17.boys4ever.info (Status: 200) [Size: 2003]
6038Found: forum.ww17.boys4ever.info (Status: 200) [Size: 1966]
6039Found: ftp.ww17.boys4ever.info (Status: 200) [Size: 1978]
6040Found: ftp0.ww17.boys4ever.info (Status: 200) [Size: 1979]
6041Found: git.ww17.boys4ever.info (Status: 200) [Size: 1984]
6042Found: helpdesk.ww17.boys4ever.info (Status: 200) [Size: 1995]
6043Found: help.ww17.boys4ever.info (Status: 200) [Size: 9639]
6044Found: gw.ww17.boys4ever.info (Status: 200) [Size: 1881]
6045Found: home.ww17.boys4ever.info (Status: 200) [Size: 1987]
6046Found: host.ww17.boys4ever.info (Status: 200) [Size: 1983]
6047Found: id.ww17.boys4ever.info (Status: 200) [Size: 1879]
6048Found: http.ww17.boys4ever.info (Status: 200) [Size: 1887]
6049Found: images.ww17.boys4ever.info (Status: 200) [Size: 1969]
6050Found: info.ww17.boys4ever.info (Status: 200) [Size: 9571]
6051Found: internet.ww17.boys4ever.info (Status: 200) [Size: 1991]
6052Found: intra.ww17.boys4ever.info (Status: 200) [Size: 1968]
6053Found: internal.ww17.boys4ever.info (Status: 200) [Size: 1979]
6054Found: intranet.ww17.boys4ever.info (Status: 200) [Size: 1985]
6055Found: lab.ww17.boys4ever.info (Status: 200) [Size: 1990]
6056Found: ipv6.ww17.boys4ever.info (Status: 200) [Size: 2013]
6057Found: ldap.ww17.boys4ever.info (Status: 200) [Size: 1985]
6058Found: linux.ww17.boys4ever.info (Status: 200) [Size: 2010]
6059Found: local.ww17.boys4ever.info (Status: 200) [Size: 1990]
6060Found: log.ww17.boys4ever.info (Status: 200) [Size: 1980]
6061Found: localhost.ww17.boys4ever.info (Status: 200) [Size: 2002]
6062Found: m.ww17.boys4ever.info (Status: 200) [Size: 1890]
6063Found: mail2.ww17.boys4ever.info (Status: 200) [Size: 1984]
6064Found: mail.ww17.boys4ever.info (Status: 200) [Size: 1977]
6065Found: mailgate.ww17.boys4ever.info (Status: 200) [Size: 1983]
6066Found: mail3.ww17.boys4ever.info (Status: 200) [Size: 2000]
6067Found: main.ww17.boys4ever.info (Status: 200) [Size: 1967]
6068Found: manage.ww17.boys4ever.info (Status: 200) [Size: 1987]
6069Found: monitor.ww17.boys4ever.info (Status: 200) [Size: 9654]
6070Found: mgmt.ww17.boys4ever.info (Status: 200) [Size: 1945]
6071Found: mirror.ww17.boys4ever.info (Status: 200) [Size: 2009]
6072Found: mobile.ww17.boys4ever.info (Status: 200) [Size: 1983]
6073Found: mssql.ww17.boys4ever.info (Status: 200) [Size: 1992]
6074Found: mta.ww17.boys4ever.info (Status: 200) [Size: 1994]
6075Found: mx.ww17.boys4ever.info (Status: 200) [Size: 1891]
6076Found: mx0.ww17.boys4ever.info (Status: 200) [Size: 1996]
6077Found: mx1.ww17.boys4ever.info (Status: 200) [Size: 9662]
6078Found: noc.ww17.boys4ever.info (Status: 200) [Size: 1998]
6079Found: mysql.ww17.boys4ever.info (Status: 200) [Size: 1992]
6080Found: ns.ww17.boys4ever.info (Status: 200) [Size: 1901]
6081Found: ns0.ww17.boys4ever.info (Status: 200) [Size: 1984]
6082Found: ns1.ww17.boys4ever.info (Status: 200) [Size: 1960]
6083Found: old.ww17.boys4ever.info (Status: 200) [Size: 1976]
6084Found: ntp.ww17.boys4ever.info (Status: 200) [Size: 1974]
6085Found: ops.ww17.boys4ever.info (Status: 200) [Size: 1972]
6086Found: ns3.ww17.boys4ever.info (Status: 200) [Size: 1988]
6087Found: oracle.ww17.boys4ever.info (Status: 200) [Size: 2017]
6088Found: news.ww17.boys4ever.info (Status: 200) [Size: 9641]
6089Found: ns2.ww17.boys4ever.info (Status: 200) [Size: 9652]
6090Found: portal.ww17.boys4ever.info (Status: 200) [Size: 2007]
6091Found: pbx.ww17.boys4ever.info (Status: 200) [Size: 2018]
6092Found: secure.ww17.boys4ever.info (Status: 200) [Size: 2001]
6093Found: server.ww17.boys4ever.info (Status: 200) [Size: 1963]
6094Found: s3.ww17.boys4ever.info (Status: 200) [Size: 1883]
6095Found: sharepoint.ww17.boys4ever.info (Status: 200) [Size: 1999]
6096Found: shop.ww17.boys4ever.info (Status: 200) [Size: 1969]
6097Found: owa.ww17.boys4ever.info (Status: 200) [Size: 9632]
6098Found: sql.ww17.boys4ever.info (Status: 200) [Size: 9662]
6099Found: smtp.ww17.boys4ever.info (Status: 200) [Size: 1993]
6100Found: sip.ww17.boys4ever.info (Status: 200) [Size: 1974]
6101Found: stage.ww17.boys4ever.info (Status: 200) [Size: 1974]
6102Found: squid.ww17.boys4ever.info (Status: 200) [Size: 2026]
6103Found: staging.ww17.boys4ever.info (Status: 200) [Size: 1992]
6104Found: svn.ww17.boys4ever.info (Status: 200) [Size: 1988]
6105Found: stats.ww17.boys4ever.info (Status: 200) [Size: 1978]
6106Found: syslog.ww17.boys4ever.info (Status: 200) [Size: 2021]
6107Found: status.ww17.boys4ever.info (Status: 200) [Size: 9653]
6108Found: ssl.ww17.boys4ever.info (Status: 200) [Size: 9652]
6109Found: ssh.ww17.boys4ever.info (Status: 200) [Size: 9622]
6110Found: test1.ww17.boys4ever.info (Status: 200) [Size: 1980]
6111Found: test.ww17.boys4ever.info (Status: 200) [Size: 1973]
6112Found: test2.ww17.boys4ever.info (Status: 200) [Size: 1984]
6113Found: upload.ww17.boys4ever.info (Status: 200) [Size: 1991]
6114Found: testing.ww17.boys4ever.info (Status: 200) [Size: 1984]
6115Found: v1.ww17.boys4ever.info (Status: 200) [Size: 1905]
6116Found: vm.ww17.boys4ever.info (Status: 200) [Size: 1897]
6117Found: v2.ww17.boys4ever.info (Status: 200) [Size: 1871]
6118Found: v3.ww17.boys4ever.info (Status: 200) [Size: 1869]
6119Found: vnc.ww17.boys4ever.info (Status: 200) [Size: 1976]
6120Found: voip.ww17.boys4ever.info (Status: 200) [Size: 9657]
6121Found: uat.ww17.boys4ever.info (Status: 200) [Size: 9658]
6122Found: web.ww17.boys4ever.info (Status: 200) [Size: 1978]
6123Found: vpn.ww17.boys4ever.info (Status: 200) [Size: 9640]
6124Found: web2test.ww17.boys4ever.info (Status: 200) [Size: 1989]
6125Found: www.ww17.boys4ever.info (Status: 200) [Size: 1958]
6126Found: wiki.ww17.boys4ever.info (Status: 200) [Size: 1987]
6127Found: www2.ww17.boys4ever.info (Status: 200) [Size: 1977]
6128Found: whois.ww17.boys4ever.info (Status: 200) [Size: 1998]
6129Found: xml.ww17.boys4ever.info (Status: 200) [Size: 1974]
6130===============================================================
61312020/02/10 16:46:55 Finished
6132===============================================================
6133##################################################################################################################################
6134Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:28 EST
6135Nmap scan report for 199.191.50.92
6136Host is up (0.50s latency).
6137Not shown: 994 filtered ports
6138PORT STATE SERVICE VERSION
613925/tcp closed smtp
614053/tcp open tcpwrapped
614180/tcp open http Apache httpd
6142|_http-server-header: Apache
6143| vulscan: VulDB - https://vuldb.com:
6144| [141649] Apache OFBiz up to 16.11.05 Form Widget Freemarker Markup Code Execution
6145| [141648] Apache OFBiz up to 16.11.05 Application Stored cross site scripting
6146| [140386] Apache Commons Beanutils 1.9.2 BeanIntrospector unknown vulnerability
6147| [139708] Apache Ranger up to 1.2.0 Policy Import cross site scripting
6148| [139540] cPanel up to 60.0.24 Apache HTTP Server Key information disclosure
6149| [139386] Apache Tike up to 1.21 RecursiveParserWrapper Stack-based memory corruption
6150| [139385] Apache Tika 1.19/1.20/1.21 SAXParsers Hang denial of service
6151| [139384] Apache Tika up to 1.21 RecursiveParserWrapper ZIP File denial of service
6152| [139261] Apache Solr 8.2.0 DataImportHandler Parameter unknown vulnerability
6153| [139259] cPanel up to 68.0.26 WHM Apache Includes Editor information disclosure
6154| [139256] cPanel up to 68.0.26 WHM Apache Configuration Include Editor cross site scripting
6155| [139239] cPanel up to 70.0.22 Apache HTTP Server Log information disclosure
6156| [139141] Apache ActiveMQ Client up to 5.15.4 ActiveMQConnection.java ActiveMQConnection denial of service
6157| [139130] cPanel up to 73.x Apache HTTP Server Injection privilege escalation
6158| [138914] Venustech Apache VCL 2.1/2.2/2.3/2.4/2.5 VM sql injection
6159| [138913] Venustech Apache VCL 2.1/2.2/2.3/2.4/2.5 Block Argument privilege escalation
6160| [138912] Venustech Apache VCL 2.1/2.2/2.3/2.4/2.5 Cookie sql injection
6161| [138816] Apache Storm up to 1.2.2 Logviewer Daemon Log information disclosure
6162| [138815] Apache Storm up to 1.2.2 UI Daemon Deserialization privilege escalation
6163| [138164] Oracle 2.7.0.1 Apache Log4j unknown vulnerability
6164| [138155] Oracle Agile Engineering Data Management 6.2.0/6.2.1 Apache Tomcat unknown vulnerability
6165| [138151] Oracle Transportation Management 6.3.7 Apache Tomcat unknown vulnerability
6166| [138149] Oracle Agile Engineering Data Management 6.2.0/6.2.1 Apache Commons FileUpload unknown vulnerability
6167| [138131] Oracle MICROS Retail XBRi Loss Prevention 10.8.0/10.8.1/10.8.2/10.8.3 Apache Tomcat unknown vulnerability
6168| [138129] Oracle Retail Xstore Point of Service 7.0/7.1 Apache HTTP Server denial of service
6169| [138123] Oracle Retail Order Management System 5.0 Apache Struts 1 unknown vulnerability
6170| [138122] Oracle Retail Order Broker 5.2/15.0 Apache Tomcat unknown vulnerability
6171| [138121] Oracle Retail Order Broker 5.2/15.0 Apache CXF unknown vulnerability
6172| [138112] Oracle Retail Integration Bus 15.0/16.0 Apache Commons FileUpload unknown vulnerability
6173| [138111] Oracle MICROS Retail XBRi Loss Prevention 10.8.0/10.8.1/10.8.2/10.8.3 Apache Commons FileUpload unknown vulnerability
6174| [138103] Oracle PeopleSoft Enterprise PeopleTools 8.55/8.56/8.57 Apache WSS4J information disclosure
6175| [138053] Oracle JD Edwards EnterpriseOne Tools 9.2 Apache Log4j unknown vulnerability
6176| [138036] Oracle Insurance Rules Palette 10.0/10.1/10.2/11.0 Apache Commons FileUpload unknown vulnerability
6177| [138035] Oracle Insurance Policy Administration J2EE 10.0/10.1/10.2/11.0 Apache Commons FileUpload unknown vulnerability
6178| [138034] Oracle Insurance Calculation Engine 9.7/10.0/10.1/10.2 Apache Commons FileUpload unknown vulnerability
6179| [138028] Oracle Identity Manager 11.1.2.3.0/12.2.1.3.0 Apache Log4j unknown vulnerability
6180| [138020] Oracle BI Publisher 11.1.1.9.0 Apache Tomcat unknown vulnerability
6181| [138019] Oracle BI Publisher (formerly XML Publisher) 11.1.1.9.0 Apache Tomcat unknown vulnerability
6182| [138017] Oracle Outside In Technology 8.5.4 Apache Commons FileUpload unknown vulnerability
6183| [138013] Oracle Outside In Technology 8.5.4 Apache Tomcat unknown vulnerability
6184| [138012] Oracle Outside In Technology 8.5.4 Apache HTTP Server unknown vulnerability
6185| [138009] Oracle Outside In Technology 8.5.4 Apache HTTP Server unknown vulnerability
6186| [138008] Oracle WebLogic Server 10.3.6.0.0/12.1.3.0.0/12.2.1.3.0 Apache Struts 1 denial of service
6187| [138007] Oracle WebCenter Sites 12.2.1.3.0 Apache Tomcat denial of service
6188| [138006] Oracle Enterprise Repository 12.1.3.0.0 Apache CXF denial of service
6189| [138000] Oracle WebCenter Sites 12.2.1.3.0 Apache Commons FileUpload unknown vulnerability
6190| [137999] Oracle WebLogic Server 10.3.6.0.0/12.1.3.0.0/12.2.1.3.0 Apache Commons FileUpload unknown vulnerability
6191| [137995] Oracle Hospitality Simphony 18.2.1 Apache WSS4J information disclosure
6192| [137987] Oracle FLEXCUBE Universal Banking up to 12.0.3/12.4.0/14.2.0 Apache Log4j unknown vulnerability
6193| [137981] Oracle Insurance IFRS 17 Analyzer 8.0.6/8.0.7 Apache Commons FileUpload unknown vulnerability
6194| [137980] Oracle Insurance Data Foundation 8.0.4/8.0.5/8.0.6/8.0.7 Apache Commons FileUpload unknown vulnerability
6195| [137979] Oracle 8.0.8 Apache Commons FileUpload unknown vulnerability
6196| [137973] Oracle 8.0.4/8.0.5/8.0.6/8.0.7 Apache Batik unknown vulnerability
6197| [137970] Oracle Financial Services Profitability Management 8.0.4/8.0.5/8.0.6/8.0.7 Apache ActiveMQ unknown vulnerability
6198| [137967] Oracle up to 8.0.7 Apache httpd unknown vulnerability
6199| [137966] Oracle 8.0.7/8.0.8 Apache Groovy unknown vulnerability
6200| [137965] Oracle Financial Services Liquidity Risk Management 8.0.1/8.0.2/8.0.4/8.0.5/8.0.6 Apache Commons FileUpload unknown vulnerability
6201| [137964] Oracle 8.0.4/8.0.5/8.0.6/8.0.7 Apache Log4j unknown vulnerability
6202| [137933] Oracle Banking Platform up to 2.7.1 Apache Tika unknown vulnerability
6203| [137926] Oracle Enterprise Manager for Fusion Middleware 13.2/13.3 Apache Commons FileUpload information disclosure
6204| [137924] Oracle Enterprise Manager Base Platform 12.1.0.5.0/13.2.0.0.0/13.3.0.0.0 Apache Commons FileUpload unknown vulnerability
6205| [137914] Oracle E-Business Suite up to 12.2.8 Apache ActiveMQ unknown vulnerability
6206| [137913] Oracle E-Business Suite up to 12.2.8 Apache ActiveMQ unknown vulnerability
6207| [137911] Oracle E-Business Suite up to 12.2.8 Apache HTTP Server unknown vulnerability
6208| [137910] Oracle E-Business Suite up to 12.2.8 Apache CXF information disclosure
6209| [137909] Oracle E-Business Suite up to 12.2.8 Apache Commons FileUpload unknown vulnerability
6210| [137905] Oracle Primavera Gateway 15.2/16.2/17.12/18.8 Apache Tika denial of service
6211| [137901] Oracle Primavera Unifier up to 18.8 Apache HTTP Server unknown vulnerability
6212| [137895] Oracle Instant Messaging Server 10.0.1.2.0 Apache Tika information disclosure
6213| [137894] Oracle EAGLE (Software) 46.5/46.6/46.7 Apache Tomcat information disclosure
6214| [137892] Oracle Online Mediation Controller 6.1 Apache Batik denial of service
6215| [137891] Oracle Interactive Session Recorder 6.0/6.1/6.2 Apache Tomcat unknown vulnerability
6216| [137885] Oracle Diameter Signaling Router (DSR) 8.0/8.1/8.2 Apache cxf unknown vulnerability
6217| [137882] Oracle Unified 8.0.0.2.0 Apache Commons FileUpload unknown vulnerability
6218| [137881] Oracle Online Mediation Controller 6.1 Apache Commons FileUpload unknown vulnerability
6219| [137880] Oracle Interactive Session Recorder 6.0/6.1/6.2 Apache Log4j unknown vulnerability
6220| [137879] Oracle Convergence 3.0.2 Apache Commons FileUpload unknown vulnerability
6221| [137876] Oracle Application Session Controller 3.7.1/3.8.0 Apache Commons FileUpload unknown vulnerability
6222| [137829] Apache Roller 5.2.3 Math Comment Authenticator Reflected cross site scripting
6223| [137736] Apache Kafka 0.11.0.0/2.1.0 ACL Validation Request privilege escalation
6224| [136858] MakerBot Replicator 5G Printer Apache HTTP Server information disclosure
6225| [136849] Analogic Poste.io 2.1.6 on Apache RoundCube logs/ information disclosure
6226| [136822] Apache Tomcat up to 8.5.40/9.0.19 Incomplete Fix CVE-2019-0199 Resource Exhaustion denial of service
6227| [136808] Apache Geode up to 1.8.0 Secure Mode privilege escalation
6228| [136646] Apache Allura up to 1.10.x Dropdown Selector Stored cross site scripting
6229| [136374] Apache HTTP Server up to 2.4.38 Slash Regular Expression unknown vulnerability
6230| [136373] Apache HTTP Server 2.4.34/2.4.35/2.4.36/2.4.37/2.4.38 HTTP2 Request Crash denial of service
6231| [136372] Apache HTTP Server up to 2.4.38 HTTP2 Request unknown vulnerability
6232| [136370] Apache Fineract up to 1.2.x sql injection
6233| [136369] Apache Fineract up to 1.2.x sql injection
6234| [135731] Apache Hadoop up to 2.8.4/2.9.1/3.1.0 yarn privilege escalation
6235| [135664] Apache Tomcat up to 7.0.93/8.5.39/9.0.0.17 SSI printenv Command cross site scripting
6236| [135663] Apache Camel up to 2.23.x JSON-lib Library XML Data XML External Entity
6237| [135661] Apache Roller up to 5.2.1/5.2.0 XML-RPC Interface XML File Server-Side Request Forgery
6238| [135402] Apache Zookeeper up to 3.4.13/3.5.0-alpha to 3.5.4-beta getACL() information disclosure
6239| [135270] Apache JSPWiki up to 2.11.0.M3 Plugin Link cross site scripting
6240| [135269] Apache JSPWiki up to 2.11.0.M3 InterWiki Link cross site scripting
6241| [135268] Apache JSPWiki up to 2.11.0.M3 Attachment cross site scripting
6242| [134527] Apache Karaf up to 4.2.4 Config Service directory traversal
6243| [134416] Apache Sanselan 0.97-incubator Loop denial of service
6244| [134415] Apache Sanselan 0.97-incubator Hang denial of service
6245| [134291] Apache Axis up to 1.7.8 Server-Side Request Forgery
6246| [134290] Apache UIMA DUCC up to 2.2.2 cross site scripting
6247| [134248] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
6248| [134247] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
6249| [134246] Apache Camel up to 2.19/2.21.3/2.22.2/2.23.0 directory traversal
6250| [134138] Apache Pluto 3.0.0/3.0.1 Chat Room Demo Portlet cross site scripting
6251| [133992] Apache Qpid Proton up to 0.27.0 Certificate Validation Man-in-the-Middle weak authentication
6252| [133977] Apache Zeppelin up to 0.7.x Stored cross site scripting
6253| [133976] Apache Zeppelin up to 0.7.x Cron Scheduler privilege escalation
6254| [133975] Apache Zeppelin up to 0.7.2 Session Fixation weak authentication
6255| [133444] Apache PDFbox 2.0.14 XML Parser XML External Entity
6256| [133573] Oracle FLEXCUBE Private Banking 2.0.0.0/2.2.0.1/12.0.1.0/12.0.3.0/12.1.0.0 Apache ActiveMQ unknown vulnerability
6257| [133407] Apache Tomcat up to 7.0.93/8.5.39/9.0.17 on Windows JRE Command Line Argument Code Execution
6258| [133315] Apache Airflow up to 1.10.2 HTTP Endpoint cross site request forgery
6259| [133314] Apache Airflow up to 1.10.2 Metadata Database cross site scripting
6260| [133290] Apache Tomcat up to 8.5.37/9.0.14 HTTP2 Stream Execution denial of service
6261| [133112] Apache HTTP Server up to 2.4.38 mod_auth_digest race condition privilege escalation
6262| [133111] Apache HTTP Server 2.4.37/2.4.38 mod_ssl Bypass privilege escalation
6263| [133092] Airsonic 10.2.1 org.apache.commons.lang.RandomStringUtils RecoverController.java java.util.Random weak authentication
6264| [132568] Apache JSPWiki up to 2.11.0.M2 URL User information disclosure
6265| [132567] Apache JSPWiki up to 2.11.0.M2 URL cross site scripting
6266| [132566] Apache ActiveMQ up to 5.15.8 MQTT Frame Memory denial of service
6267| [132565] Apache HBase up to 2.1.3 REST Server Request privilege escalation
6268| [132183] Apache Mesos up to pre-1.4.x Docker Image Code Execution
6269| [131988] Apache Karaf up to 4.2.2 kar Deployer directory traversal
6270| [131859] Apache Hadoop up to 2.9.1 privilege escalation
6271| [131479] Apache Solr up to 7.6 HTTP GET Request Server-Side Request Forgery
6272| [131446] Apache Solr up to 5.0.5/6.6.5 Config API HTTP POST Request Code Execution
6273| [131385] Apache Qpid Broker-J up to 6.x/7.0.6/7.1.0 AMQP Command Crash denial of service
6274| [131315] Apache Mesos up to pre-1.4.x Mesos Masters Rendering JSON Payload Recursion denial of service
6275| [131236] Apache Airflow up to 1.10.1 Metadata Database cross site scripting
6276| [130755] Apache JSPWiki up to 2.10.5 URL cross site scripting
6277| [130629] Apache Guacamole Cookie Flag weak encryption
6278| [130628] Apache Hadoop up to 3.0.0 HDFS information disclosure
6279| [130529] Apache Subversion 1.10.0/1.10.1/1.10.2/1.10.3/1.11.0 mod_dav_svn Directory Crash denial of service
6280| [130353] Apache Open Office up to 4.1.5 Document Loader String memory corruption
6281| [130341] Apache HTTP Server 2.4.37 mod_ssl Loop denial of service
6282| [130330] Apache HTTP Server up to 2.4.37 mod_session Expired privilege escalation
6283| [130329] Apache HTTP Server 2.4.37 mod_http2 Slowloris denial of service
6284| [130212] Apache Airflow up to 1.10.0 LDAP Auth Backend Certificate weak authentication
6285| [130123] Apache Airflow up to 1.8.2 information disclosure
6286| [130122] Apache Airflow up to 1.8.2 command injection cross site request forgery
6287| [130121] Apache Airflow up to 1.8.2 Webserver Object Code Execution
6288| [129717] Oracle Secure Global Desktop 5.4 Apache HTTP Server denial of service
6289| [129688] Oracle Tape Library ACSLS 8.4 Apache Log4j unknown vulnerability
6290| [129673] Oracle Retail Returns Management 13.3/13.4/14.0/14.1 Apache Commons Fileupload unknown vulnerability
6291| [129672] Oracle Retail Central Office 13.3/13.4/14.0/14.1 Apache Commons Fileupload unknown vulnerability
6292| [129671] Oracle Retail Back Office 13.3/13.4/14.0/14.1 Apache Commons Fileupload unknown vulnerability
6293| [129574] Oracle Outside In Technology 8.5.3/8.5.4 Apache Tomcat denial of service
6294| [129573] Oracle WebLogic Server 10.3.6.0 Apache HTTP Server denial of service
6295| [129563] Oracle Enterprise Repository 12.1.3.0.0 Apache Log4j unknown vulnerability
6296| [129555] Oracle Outside In Technology 8.5.3 Apache Batik denial of service
6297| [129551] Oracle Outside In Technology 8.5.3/8.5.4 Apache Commons FileUpload denial of service
6298| [129542] Oracle API Gateway 11.1.2.4.0 Apache Batik denial of service
6299| [129538] Oracle SOA Suite 12.1.3.0.0/12.2.1.3.0 Apache Batik unknown vulnerability
6300| [129519] Oracle Enterprise Manager Ops Center 12.2.2/12.3.3 Apache ActiveMQ unknown vulnerability
6301| [129508] Oracle Applications Manager up to 12.2.8 Apache Derby unknown vulnerability
6302| [129507] Oracle Mobile Field Service up to 12.2.8 Apache Log4j unknown vulnerability
6303| [129505] Oracle Email Center up to 12.2.8 Apache Log4j unknown vulnerability
6304| [129504] Oracle CRM Technical Foundation up to 12.2.8 Apache Commons FileUpload unknown vulnerability
6305| [129499] Oracle Partner Management up to 12.2.8 Apache Log4j unknown vulnerability
6306| [129498] Oracle Marketing up to 12.2.8 Apache Commons FileUpload unknown vulnerability
6307| [129480] Oracle Communications WebRTC Session Controller up to 7.1 Apache Batik unknown vulnerability
6308| [129479] Oracle Communications Diameter Signaling Router up to 8.2 Apache Batik unknown vulnerability
6309| [129474] Oracle Communications Diameter Signaling Router up to 8.2 Apache HTTP Server information disclosure
6310| [129472] Oracle Communications WebRTC Session Controller up to 7.1 Apache Struts 1 unknown vulnerability
6311| [129470] Oracle Communications Converged Application Server up to 7.0.0.0 Apache Struts 1 unknown vulnerability
6312| [129463] Oracle Communications WebRTC Session Controller up to 7.1 Apache Log4j unknown vulnerability
6313| [129461] Oracle Communications Services Gatekeeper up to 6.1.0.3.x Apache Commons Collections Fileupload unknown vulnerability
6314| [129460] Oracle Communications Service Broker 6.0 Apache Log4j unknown vulnerability
6315| [129459] Oracle Communications Policy Management up to 12.4 Apache Struts 2 unknown vulnerability
6316| [129458] Oracle Communications Online Mediation Controller 6.1 Apache Log4j unknown vulnerability
6317| [129457] Oracle Communications Diameter Signaling Router up to 8.2 Apache Commons Fileupload unknown vulnerability
6318| [129456] Oracle Communications Converged Application Server 6.1 Apache Log4j unknown vulnerability
6319| [128714] Apache Thrift Java Client Library up to 0.11.0 SASL Negotiation org.apache.thrift.transport.TSaslTransport unknown vulnerability
6320| [128713] Apache Thrift Node.js Static Web Server up to 0.11.0 directory traversal
6321| [128709] Apache Karaf up to 4.1.6/4.2.1 Features Deployer XMLInputFactory XML External Entity
6322| [128575] Apache NetBeans 9.0 Proxy Auto-Config Code Execution
6323| [128369] Apache Tika 1.8-1.19.1 SQLite3Parser Loop sql injection
6324| [128111] Apache NiFi 1.8.0 Template Upload Man-in-the-Middle cross site request forgery
6325| [128110] Apache NiFi 1.8.0 Cluster Request privilege escalation
6326| [128109] Apache NiFi 1.8.0 Error Page message-page.jsp Request Header cross site scripting
6327| [128108] Apache NiFi up to 1.7.x X-Frame-Options Header privilege escalation
6328| [128102] Apache Oozie up to 5.0.0 Workflow XML Impersonation spoofing
6329| [127994] WordPress up to 5.0.0 on Apache httpd MIME Restriction cross site scripting
6330| [127981] Apache OFBiz 16.11.01/16.11.02/16.11.03/16.11.04 HTTP Engine httpService GET Request privilege escalation
6331| [127161] Apache Hadoop 2.7.4/2.7.5/2.7.6 Incomplete Fix CVE-2016-6811 privilege escalation
6332| [127040] Loadbalancer.org Enterprise VA MAX up to 8.3.2 Apache HTTP Server Log cross site scripting
6333| [127007] Apache Spark Request Code Execution
6334| [126791] Apache Hadoop up to 0.23.11/2.7.6/2.8.4/2.9.1/3.0.2 ZIP File unknown vulnerability
6335| [126767] Apache Qpid Proton-J Transport 0.3 Certificate Verification Man-in-the-Middle weak authentication
6336| [126896] Apache Commons FileUpload 1.3.3 on LDAP Manager DiskFileItem File privilege escalation
6337| [126574] Apache Hive up to 2.3.3/3.1.0 Query privilege escalation
6338| [126573] Apache Hive up to 2.3.3/3.1.0 HiveServer2 privilege escalation
6339| [126564] Apache Superset up to 0.22 Pickle Library load Code Execution
6340| [126488] Apache Syncope up to 2.0.10/2.1.1 BPMN Definition xxe privilege escalation
6341| [126487] Apache Syncope up to 2.0.10/2.1.1 cross site scripting
6342| [126346] Apache Tomcat Path privilege escalation
6343| [125922] Apache Impala up to 3.0.0 ALTER privilege escalation
6344| [125921] Apache Impala up to 3.0.0 Queue Injection privilege escalation
6345| [125647] Oracle Agile Engineering Data Management 6.1.3/6.2.0/6.2.1 Install (Apache Tomcat) information disclosure
6346| [125617] Oracle Retail Returns Management 14.1 Apache Batik unknown vulnerability
6347| [125616] Oracle Retail Point-of-Service 13.4/14.0/14.1 Apache Batik unknown vulnerability
6348| [125614] Oracle Retail Central Office 14.1 Apache Batik unknown vulnerability
6349| [125613] Oracle Retail Back Office 13.3/13.4/14/14.1 Apache Batik unknown vulnerability
6350| [125599] Oracle Retail Open Commerce Platform 5.3.0/6.0.0/6.0.1 Apache Log4j unknown vulnerability
6351| [125569] Oracle PeopleSoft Enterprise PeopleTools 8.55/8.56 Apache HTTP Server information disclosure
6352| [125494] Oracle Hospitality Guest Access 4.2.0/4.2.1 Apache Tomcat information disclosure
6353| [125447] Oracle Business Intelligence Enterprise Edition 11.1.1.7.0/11.1.1.9.0/12.2.1.3.0/12.2.1.4.0 Apache Batik unknown vulnerability
6354| [125428] Oracle Identity Management Suite 11.1.2.3.0/12.2.1.3.0 Apache Log4j unknown vulnerability
6355| [125427] Oracle Identity Analytics 11.1.1.5.8 Apache Log4j unknown vulnerability
6356| [125424] Oracle API Gateway 11.1.2.4.0 Apache Log4j unknown vulnerability
6357| [125423] Oracle BI Publisher 11.1.1.7.0/11.1.1.9.0/12.2.1.3.0/12.2.1.4.0 Apache Log4j unknown vulnerability
6358| [125383] Oracle up to 10.2.0 Apache Trinidad unknown vulnerability
6359| [125379] Oracle up to 10.1.x Apache Struts 1 cross site scripting
6360| [125377] Oracle up to 10.2.0 Apache Commons Collections unknown vulnerability
6361| [125376] Oracle Communications Application Session Controller up to 3.7.0 Apache Commons Collections unknown vulnerability
6362| [125375] Oracle Communications User Data Repository up to 12.1.x Apache Xerces memory corruption
6363| [125248] Apache ActiveMQ up to 5.15.5 Web-based Administration Console queue.jsp Parameter cross site scripting
6364| [125133] Apache Tika up to 1.19 XML Parser reset() denial of service
6365| [124877] Apache PDFbox up to 2.0.11 PDF File denial of service
6366| [124876] Apache Ranger up to 1.1.x UnixAuthenticationService Stack-based memory corruption
6367| [124791] Apache Tomcat up to 7.0.90/8.5.33/9.0.11 URL Open Redirect
6368| [124787] Apache Pony Mail 0.7/0.8/0.9 Statistics Generator Timestamp Data information disclosure
6369| [124447] Apache HTTP Server up to 2.4.34 SETTINGS Frame denial of service
6370| [124346] Apache Mesos pre-1.4.2/1.5.0/1.5.1/1.6.0 on Executor HTTP API String Comparison validation JSON Web Token information disclosure
6371| [124286] Apache Tika up to 1.18 IptcAnpaParser Loop denial of service
6372| [124242] Apache Tika up to 0.18 C:/evil.bat" Directory unknown vulnerability
6373| [124241] Apache Tika up to 0.18 XML Parser Entity Expansion denial of service
6374| [124191] Apache Karaf up to 3.0.8/4.0.8/4.1.0 WebConsole .../gogo/ weak authentication
6375| [124190] Apache Karaf up to 4.1.x sshd privilege escalation
6376| [124152] Apache Camel Mail up to 2.22.0 Path directory traversal
6377| [124143] Apache SpamAssassin up to 3.4.1 PDFInfo Plugin Code Execution
6378| [124134] Apache SpamAssassin up to 3.4.1 Scan Engine HTML::Parser Email denial of service
6379| [124095] PHP up to 5.6.37/7.0.31/7.1.21/7.2.9 Apache2 sapi_apache2.c php_handler cross site scripting
6380| [124024] Apache Mesos 1.4.x/1.5.0 libprocess JSON Payload denial of service
6381| [123814] Apache ActiveMQ Client up to 5.15.5 TLS Hostname Verification Man-in-the-Middle weak authentication
6382| [123393] Apache Traffic Server up to 6.2.2/7.1.3 ESI Plugin Config privilege escalation
6383| [123392] Apache Traffic Server 6.2.2 TLS Handshake Segmentation Fault denial of service
6384| [123391] Apache Traffic Server up to 6.2.2/7.1.3 Range Request Performance denial of service
6385| [123390] Apache Traffic Server up to 6.2.2/7.1.3 Request HTTP Smuggling privilege escalation
6386| [123369] Apache Traffic Server up to 6.2.2/7.1.3 ACL remap.config Request denial of service
6387| [123197] Apache Sentry up to 2.0.0 privilege escalation
6388| [123145] Apache Struts up to 2.3.34/2.5.16 Namespace Code Execution
6389| [123144] Apache Cayenne up to 4.1.M1 CayenneModeler XML File File Transfer privilege escalation
6390| [122981] Apache Commons Compress 1.7 ZipArchiveInputStream ZIP Archive denial of service
6391| [122889] Apache HTTP Server up to 2.2.31/2.4.23 mod_userdir HTTP Response Splitting privilege escalation
6392| [122800] Apache Spark 1.3.0 REST API weak authentication
6393| [122642] Apache Airflow up to 1.8.x 404 Page Reflected cross site scripting
6394| [122568] Apache Tomcat up to 8.5.31/9.0.9 Connection Reuse weak authentication
6395| [122567] Apache Axis 1.0./1.1/1.2/1.3/1.4 cross site scripting
6396| [122556] Apache Tomcat up to 7.0.86/8.0.51/8.5.30/9.0.7 UTF-8 Decoder Loop denial of service
6397| [122531] Apache Tomcat up to 7.0.88/8.0.52/8.5.31/9.0.9 WebSocket Client unknown vulnerability
6398| [122456] Apache Camel up to 2.20.3/2.21.0 XSD Validator XML External Entity
6399| [122455] Apache Tomcat Native up to 1.1.34/1.2.16 OSCP Revoked Certificate weak authentication
6400| [122454] Apache Tomcat Native up to 1.1.34/1.2.16 OSCP Responder Revoked Certificate weak authentication
6401| [122214] Apache Kafka up to 0.9.0.1/0.10.2.1/0.11.0.2/1.0.0 Broker Request Data Loss denial of service
6402| [122202] Apache Kafka up to 0.10.2.1/0.11.0.1 SASL Impersonation spoofing
6403| [122101] Docker Skeleton Runtime for Apache OpenWhisk Docker Action dockerskeleton:1.3.0 privilege escalation
6404| [122100] PHP Runtime for Apache OpenWhisk Docker Action action-php-v7.2:1.0.0 privilege escalation
6405| [122012] Apache Ignite up to 2.5 Serialization privilege escalation
6406| [121911] Apache Ambari up to 2.5.x/2.6.2 Log Message Credentials information disclosure
6407| [121910] Apache HTTP Server 2.4.33 mod_md HTTP Requests denial of service
6408| [121854] Oracle Tape Library ACSLS up to ACSLS 8.4.0-2 Apache Commons Collections unknown vulnerability
6409| [121752] Oracle Insurance Policy Administration 10.0/10.1/10.2/11.0 Apache Log4j unknown vulnerability
6410| [121370] Apache Spark up to 2.1.2/2.2.1/2.3.0 URL cross site scripting
6411| [121354] Apache CouchDB HTTP API Code Execution
6412| [121144] Apache LDAP API up to 1.0.1 SSL Filter information disclosure
6413| [121143] Apache Storm up to 0.10.2/1.0.6/1.1.2/1.2.1 Cluster privilege escalation
6414| [120436] Apache CXF Fediz up to 1.4.3 Application Plugin unknown vulnerability
6415| [120310] Apache PDFbox up to 1.8.14/2.0.10 AFMParser Loop denial of service
6416| [120168] Apache CXF weak authentication
6417| [120080] Apache Cassandra up to 3.11.1 JMX/RMI Interface RMI Request privilege escalation
6418| [120043] Apache HBase up to 1.2.6.0/1.3.2.0/1.4.4/2.0.0 Thrift 1 API Server weak authentication
6419| [119723] Apache Qpid Broker-J 7.0.0/7.0.1/7.0.2/7.0.3/7.0.4 AMQP Messages Crash denial of service
6420| [122569] Apache HTTP Server up to 2.4.33 HTTP2 Request denial of service
6421| [119486] Apache Geode up to 1.4.0 Security Manager Code Execution
6422| [119306] Apache MXNet Network Interface privilege escalation
6423| [118999] Apache Storm up to 1.0.6/1.1.2/1.2.1 Archive directory traversal
6424| [118996] Apache Storm up to 1.0.6/1.1.2/1.2.1 Daemon spoofing
6425| [118644] Apple macOS up to 10.13.5 apache_mod_php unknown vulnerability
6426| [118200] Apache Batik up to 1.9 Deserialization unknown vulnerability
6427| [118143] Apache NiFi activemq-client Library Deserialization denial of service
6428| [118142] Apache NiFi 1.6.0 SplitXML xxe privilege escalation
6429| [118051] Apache Zookeeper up to 3.4.9/3.5.3-beta weak authentication
6430| [117997] Apache ORC up to 1.4.3 ORC File Recursion denial of service
6431| [117825] Apache Tomcat up to 7.0.88/8.0.52/8.5.31/9.0.8 CORS Filter privilege escalation
6432| [117405] Apache Derby up to 10.14.1.0 Network Server Network Packet privilege escalation
6433| [117347] Apache Ambari up to 2.6.1 HTTP Request directory traversal
6434| [117265] LibreOffice/Apache Office Writer SMB Connection XML Document information disclosure
6435| [117143] Apache uimaj/uima-as/uimaFIT/uimaDUCC XML XXE information disclosure
6436| [117117] Apache Tika up to 1.17 ChmParser Loop denial of service
6437| [117116] Apache Tika up to 1.17 BPGParser Loop denial of service
6438| [117115] Apache Tika up to 1.17 tika-server command injection
6439| [116929] Apache Fineract getReportType Parameter privilege escalation
6440| [116928] Apache Fineract REST Endpoint Parameter privilege escalation
6441| [116927] Apache Fineract MakercheckersApiResource Parameter sql injection
6442| [116926] Apache Fineract REST Parameter privilege escalation
6443| [116574] Apache wicket-jquery-ui up to 6.29.0/7.10.1/8.0.0-M9.1 WYSIWYG Editor privilege escalation
6444| [116622] Oracle Enterprise Manager for MySQL Database 12.1.0.4 EM Plugin: General (Apache Tomcat) unknown vulnerability
6445| [115931] Apache Solr up to 6.6.2/7.2.1 XML Data Parameter XML External Entity
6446| [115883] Apache Hive up to 2.3.2 privilege escalation
6447| [115882] Apache Hive up to 2.3.2 xpath_short information disclosure
6448| [115881] Apache DriverHive JDBC Driver up to 2.3.2 Escape Argument Bypass privilege escalation
6449| [115518] Apache Ignite 2.3 Deserialization privilege escalation
6450| [115260] EMC RSA Authentication Agent for Web up to 8.0.1 on IIS/Apache cross site scripting
6451| [115259] EMC RSA Authentication Agent for Web up to 8.0.1 on IIS/Apache Cookie Stack-based memory corruption
6452| [115500] CA Workload Control Center up to r11.4 SP5 Apache MyFaces Component Code Execution
6453| [115121] Apache Struts REST Plugin up to 2.5.15 Xstream XML Data denial of service
6454| [115061] Apache HTTP Server up to 2.4.29 HTTP Digest Authentication Challenge HTTP Requests Replay privilege escalation
6455| [115060] Apache HTTP Server up to 2.4.29 mod_cache_socache Request Header Crash denial of service
6456| [115059] Apache HTTP Server up to 2.4.29 HTTP2 NULL Pointer Dereference denial of service
6457| [115058] Apache HTTP Server up to 2.4.29 HTTP Header Crash denial of service
6458| [115057] Apache HTTP Server up to 2.4.29 mod_session Variable Name Cache privilege escalation
6459| [115039] Apache HTTP Server up to 2.4.29 FilesMatch File Upload privilege escalation
6460| [115038] Apache HTTP Server up to 2.0.65/2.2.34/2.4.29 mod_authnz_ldap Crash denial of service
6461| [114817] Apache Syncope up to 1.2.10/2.0.7 Search Parameter information disclosure
6462| [114816] Apache Syncope up to 1.2.10/2.0.7 XSLT Code Execution
6463| [114717] Apache Commons 1.11/1.12/1.13/1.14/1.15 ZIP Archive ZipFile/ZipArchiveInputStream denial of service
6464| [114661] Apache Allura up to 1.8.0 HTTP Response Splitting privilege escalation
6465| [114400] Apache Tomcat JK ISAPI Connector up to 1.2.42 IIS/ISAPI privilege escalation
6466| [114258] Apache HTTP Server up to 2.4.22 mod_cluster Segmentation Fault denial of service
6467| [114086] Apache ODE 1.3.3 ODE Process Deployment Web Service directory traversal
6468| [113955] Apache Xerces-C up to 3.2.0 XML Parser NULL Pointer Dereference denial of service
6469| [113945] Apache Tomcat up to 7.0.84/8.0.49/8.5.27/9.0.4 URL Pattern Empty String privilege escalation
6470| [113944] Apache OpenMeetings up to 3.x/4.0.1 CRUD Operation denial of service
6471| [113905] Apache Traffic Server up to 5.2.x/5.3.2/6.2.0/7.0.0 TLS Handshake Core Dump denial of service
6472| [113904] Apache Traffic Server up to 6.2.0 Host Header privilege escalation
6473| [113895] Apache Geode up to 1.3.x Code Execution
6474| [113894] Apache Geode up to 1.3.x TcpServer Code Execution
6475| [113888] Apache James Hupa WebMail 0.0.2 cross site scripting
6476| [113813] Apache Geode Cluster up to 1.3.x Secure Mode privilege escalation
6477| [113747] Apache Tomcat Servlets privilege escalation
6478| [113647] Apache Qpid up to 0.30 qpidd Broker AMQP Message Crash denial of service
6479| [113645] Apache VCL up to 2.1/2.2.1/2.3.1 Web GUI/XMLRPC API privilege escalation
6480| [113560] Apache jUDDI Console 3.0.0 Log Entries spoofing
6481| [113571] Apache Oozie up to 4.3.0/5.0.0-beta1 XML Data XML File privilege escalation
6482| [113569] Apache Karaf up to 4.0.7 LDAPLoginModule LDAP injection denial of service
6483| [113273] Apache JMeter 2.x/3.x Distributed Test Only privilege escalation
6484| [113198] Apache Qpid Dispatch Router 0.7.0/0.8.0 AMQP denial of service
6485| [113186] Apache JMeter 2.x/3.x Distributed Test Only privilege escalation
6486| [113145] Apache Thrift up to 0.9.3 Go Client Library privilege escalation
6487| [113106] Apache jUDDI up to 3.3.3 XML Data WADL2Java/WSDL2Java XML Document privilege escalation
6488| [113105] Apache Qpid Broker-J 7.0.0 AMQP Crash denial of service
6489| [112885] Apache Allura up to 1.8.0 File information disclosure
6490| [112856] Apache CloudStack up to 4.8.1.0/4.9.0.0 API weak authentication
6491| [112855] Apache CloudStack 4.1.0/4.1.1 API information disclosure
6492| [112678] Apache Tomcat up to 7.0.82/8.0.47/8.5.23/9.0.1 Bug Fix 61201 privilege escalation
6493| [112677] Apache Tomcat Native Connector up to 1.1.34/1.2.14 OCSP Checker Client weak authentication
6494| [112625] Apache POI up to 3.16 Loop denial of service
6495| [112448] Apache NiFi up to 1.3.x Deserialization privilege escalation
6496| [112396] Apache Hadoop 2.7.3/2.7.4 YARN NodeManager Credentials information disclosure
6497| [112339] Apache NiFi 1.5.0 Header privilege escalation
6498| [112330] Apache NiFi 1.5.0 Header HTTP Request privilege escalation
6499| [112314] NetGain Enterprise Manager 7.2.730 Build 1034 org.apache.jsp.u.jsp.tools.exec_jsp Servlet Parameter privilege escalation
6500| [112253] Apache Hadoop up to 0.23.x/2.7.4/2.8.2 MapReduce Job History Server Configuration File privilege escalation
6501| [112171] Oracle Secure Global Desktop 5.3 Apache Log4j privilege escalation
6502| [112164] Oracle Agile PLM 9.3.5/9.3.6 Apache Tomcat unknown vulnerability
6503| [112161] Oracle Agile PLM 9.3.3/9.3.4/9.3.5/9.3.6 Apache Tomcat privilege escalation
6504| [112158] Oracle Autovue for Agile Product Lifecycle Management 21.0.0/21.0.1 Apache Log4j privilege escalation
6505| [112156] Oracle Agile PLM 9.3.3/9.3.4/9.3.5/9.3.6 Apache Log4j privilege escalation
6506| [112155] Oracle Agile Engineering Data Management 6.1.3/6.2.0/6.2.1 Apache Log4j privilege escalation
6507| [112137] Oracle MICROS Relate CRM Software 10.8.x/11.4.x/15.0.x, Apache Tomcat unknown vulnerability
6508| [112136] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Tomcat privilege escalation
6509| [112133] Oracle Retail Workforce Management 1.60.7/1.64.0 Apache Log4j privilege escalation
6510| [112129] Oracle Retail Assortment Planning 14.1.3/15.0.3/16.0.1 Apache Log4j privilege escalation
6511| [112114] Oracle 9.1 Apache Log4j privilege escalation
6512| [112113] Oracle 9.1 Apache Log4j privilege escalation
6513| [112045] Oracle Hospitality Guest Access 4.2.0/4.2.1 Apache Tomcat privilege escalation
6514| [112038] Oracle Health Sciences Empirica Inspections 1.0.1.1 Apache Tomcat information disclosure
6515| [112019] Oracle Endeca Information Discovery Integrator 3.1.0/3.2.0 Apache Tomcat privilege escalation
6516| [112017] Oracle WebCenter Portal 11.1.1.9.0/12.2.1.2.0/12.2.1.3.0 Apache Struts 1 cross site scripting
6517| [112011] Oracle Identity Manager 11.1.2.3.0 Apache Commons Collections privilege escalation
6518| [111950] Oracle Database 12.2.0.1 Apache Tomcat information disclosure
6519| [111703] Apache Sling XSS Protection API 1.0.4 URL Encoding cross site scripting
6520| [111556] Apache Geode up to 1.2.x Secure Mode Parameter OQL privilege escalation
6521| [111555] Apache Geode up to 1.2.x Secure Mode OQL privilege escalation
6522| [111540] Apache Geode up to 1.2.x Secure Mode information disclosure
6523| [111519] Apache Sling JCR ContentLoader 2.1.4 xmlreader directory traversal
6524| [111338] Apache DeltaSpike-JSF 1.8.0 cross site scripting
6525| [111330] Apache OFBiz 16.11.01/16.11.02/16.11.03 BIRT Plugin cross site scripting
6526| [110789] Apache Sling up to 1.4.0 Authentication Service Credentials information disclosure
6527| [110785] Apache Drill up to 1.11.0 Query Page unknown vulnerability
6528| [110701] Apache Fineract Query Parameter sql injection
6529| [110484] Apache Synapse up to 3.0.0 Apache Commons Collections Serialized Object Code Injection privilege escalation
6530| [110426] Adobe Experience Manager 6.0/6.1/6.2/6.3 Apache Sling Servlets Post cross site scripting
6531| [110141] Apache Struts up to 2.5.14 REST Plugin denial of service
6532| [110140] Apache Qpid Broker-J up to 0.32 privilege escalation
6533| [110139] Apache Qpid Broker-J up to 6.1.4 AMQP Frame denial of service
6534| [110106] Apache CXF Fediz Spring cross site request forgery
6535| [109766] Apache OpenOffice up to 4.1.3 DOC File Parser WW8Fonts memory corruption
6536| [109750] Apache OpenOffice up to 4.1.3 DOC File Parser ImportOldFormatStyles memory corruption
6537| [109749] Apache OpenOffice up to 4.1.3 PPT File Parser PPTStyleSheet memory corruption
6538| [109606] October CMS Build 412 Apache Configuration File Upload privilege escalation
6539| [109419] Apache Camel up to 2.19.3/2.20.0 camel-castor Java Object Deserialization privilege escalation
6540| [109418] Apache Camel up to 2.19.3/2.20.0 camel-hessian Java Object Deserialization privilege escalation
6541| [109400] Apache CouchDB up to 1.6.x/2.1.0 Database Server Shell privilege escalation
6542| [109399] Apache CouchDB up to 1.6.x/2.1.0 JSON Parser Shell privilege escalation
6543| [109398] Apache CXF 3.1.14/3.2.1 JAX-WS/JAX-RS Attachment denial of service
6544| [108872] Apache Hive up to 2.1.1/2.2.0/2.3.0 Policy Enforcement privilege escalation
6545| [108939] Apple macOS up to 10.13.1 apache unknown vulnerability
6546| [108938] Apple macOS up to 10.13.1 apache denial of service
6547| [108937] Apple macOS up to 10.13.1 apache unknown vulnerability
6548| [108936] Apple macOS up to 10.13.1 apache unknown vulnerability
6549| [108935] Apple macOS up to 10.13.1 apache denial of service
6550| [108934] Apple macOS up to 10.13.1 apache unknown vulnerability
6551| [108933] Apple macOS up to 10.13.1 apache unknown vulnerability
6552| [108932] Apple macOS up to 10.13.1 apache unknown vulnerability
6553| [108931] Apple macOS up to 10.13.1 apache denial of service
6554| [108930] Apple macOS up to 10.13.1 apache unknown vulnerability
6555| [108929] Apple macOS up to 10.13.1 apache denial of service
6556| [108928] Apple macOS up to 10.13.1 apache unknown vulnerability
6557| [108797] Apache Struts up to 2.3.19 TextParseUtiltranslateVariables OGNL Expression privilege escalation
6558| [108795] Apache Traffic Server up to 5.3.0 HTTP2 set_dynamic_table_size memory corruption
6559| [108794] Apache WSS4J up to 1.6.16/2.0.1 Incomplete Fix Leak information disclosure
6560| [108793] Apache Qpid up to 0.30 qpidd Crash denial of service
6561| [108792] Apache Traffic Server up to 5.1.0 Access Restriction privilege escalation
6562| [108791] Apache Wicket up to 1.5.11/6.16.x/7.0.0-M2 Session information disclosure
6563| [108790] Apache Storm 0.9.0.1 Log Viewer directory traversal
6564| [108789] Apache Cordova In-App-Browser Standalone Plugin up to 0.3.1 on iOS CDVInAppBrowser privilege escalation
6565| [108788] Apache Cordova File-Transfer Standalone Plugin up to 0.4.1 on iOS ios/CDVFileTransfer.m spoofing
6566| [108787] Apache HttpClient up to 4.3.0 HttpClientBuilder.java unknown vulnerability
6567| [108786] Apache Wicket up to 1.4.21/1.5.9/6.3.x script Tag cross site scripting
6568| [108783] Apache Hadoop up to 0.23.3/1.0.3/2.0.1 Kerberos Security Feature Key weak encryption
6569| [108782] Apache Xerces2 XML Service denial of service
6570| [108781] Apache jUDDI up to 1.x happyjuddi.jsp Parameter cross site scripting
6571| [108780] Apache jUDDI up to 1.x Log File uddiget.jsp spoofing
6572| [108709] Apache Cordova Android up to 3.7.1/4.0.1 intent URL privilege escalation
6573| [108708] Apache ActiveMQ up to 5.10.0 XML Data XML External Entity
6574| [108707] Apache ActiveMQ up to 1.7.0 XML Data XML External Entity
6575| [108629] Apache OFBiz up to 10.04.01 privilege escalation
6576| [108543] Apache Derby 10.1.2.1/10.2.2.0/10.3.1.4/10.4.1.3 Export File privilege escalation
6577| [108312] Apache HTTP Server on RHEL IP Address Filter privilege escalation
6578| [108297] Apache NiFi up to 0.7.1/1.1.1 Proxy Chain Username Deserialization privilege escalation
6579| [108296] Apache NiFi up to 0.7.1/1.1.1 Cluster Request privilege escalation
6580| [108250] Oracle Secure Global Desktop 5.3 Apache HTTP Server memory corruption
6581| [108245] Oracle Transportation Management up to 6.3.7 Apache Tomcat unknown vulnerability
6582| [108244] Oracle Transportation Management 6.4.1/6.4.2 Apache Commons FileUpload denial of service
6583| [108243] Oracle Agile Engineering Data Management 6.1.3/6.2.0 Apache Commons Collections memory corruption
6584| [108222] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Batik denial of service
6585| [108219] Oracle MICROS Retail XBRi Loss Prevention up to 10.8.1 Apache Tomcat unknown vulnerability
6586| [108217] Oracle Retail Store Inventory Management 13.2.9/14.0.4/14.1.3/15.0.1/16.0.1 Apache Groovy unknown vulnerability
6587| [108216] Oracle Retail Convenience and Fuel POS Software 2.1.132 Apache Groovy unknown vulnerability
6588| [108169] Oracle MySQL Enterprise Monitor up to 3.2.8.2223/3.3.4.3247/3.4.2.4181 Apache Tomcat unknown vulnerability
6589| [108113] Oracle Hospitality Guest Access 4.2.0/4.2.1 Apache Batik denial of service
6590| [108107] Oracle Hospitality Guest Access 4.2.0/4.2.1 Apache Tomcat unknown vulnerability
6591| [108102] Oracle Healthcare Master Person Index 4.x Apache Groovy unknown vulnerability
6592| [108085] Oracle Identity Manager 11.1.2.3.0 Apache Struts 1 memory corruption
6593| [108083] Oracle API Gateway 11.1.2.4.0 Apache Batik denial of service
6594| [108080] Oracle GlassFish Server 3.1.2 Apache Commons FileUpload denial of service
6595| [108066] Oracle Management Pack for GoldenGate 11.2.1.0.12 Apache Tomcat memory corruption
6596| [108062] Oracle BI Publisher 11.1.1.7.0/12.2.1.1.0/12.2.1.2.0 Apache ActiveMQ memory corruption
6597| [108060] Oracle Enterprise Manager Ops Center 12.2.2/12.3.2 Apache Groovy unknown vulnerability
6598| [108033] Oracle Primavera Unifier 9.13/9.14/10.x/15.x/16.x, Apache Groovy unknown vulnerability
6599| [108013] Oracle Communications WebRTC Session Controller 7.0/7.1/7.2 Apache Groovy unknown vulnerability
6600| [108011] Oracle Communications Services Gatekeeper 5.1/6.0 Apache Trinidad unknown vulnerability
6601| [107904] Apache Struts up to 2.3.28 Double OGNL Evaluation privilege escalation
6602| [107860] Apache Solr up to 7.0 Apache Lucene RunExecutableListener XML External Entity
6603| [107834] Apache Ranger up to 0.6.1 Change Password privilege escalation
6604| [107639] Apache NiFi 1.4.0 XML External Entity
6605| [107606] Apache ZooKeper up to 3.4.9/3.5.2 Command CPU Exhaustion denial of service
6606| [107597] Apache Roller up to 5.0.2 XML-RPC Protocol Support XML External Entity
6607| [107429] Apache Impala up to 2.9.x Kudu Table privilege escalation
6608| [107411] Apache Tomcat up to 7.0.81/8.0.46/8.5.22/9.0.0 JSP File File Upload privilege escalation
6609| [107385] Apache Geode up to 1.2.0 Secure Mode privilege escalation
6610| [107339] Apache OpenNLP up to 1.5.3/1.6.0/1.7.2/1.8.1 XML Data XML External Entity
6611| [107333] Apache Wicket up to 8.0.0-M1 CSRF Prevention HTTP Header privilege escalation
6612| [107323] Apache Wicket 1.5.10/6.13.0 Class Request information disclosure
6613| [107310] Apache Geode up to 1.2.0 Command Line Utility Query privilege escalation
6614| [107276] ArcSight ESM/ArcSight ESM Express up to 6.9.1c Patch 3/6.11.0 Apache Tomcat Version information disclosure
6615| [107266] Apache Tika up to 1.12 XML Parser XML External Entity
6616| [107262] Apache Mesos up to 1.1.2/1.2.1/1.3.0/1.4.0-dev libprocess HTTP Request Crash denial of service
6617| [107258] Apache Mesos up to 1.1.2/1.2.1/1.3.0/1.4.0-dev libprocess HTTP Request Crash denial of service
6618| [107197] Apache Xerces Jelly Parser XML File XML External Entity
6619| [107193] ZTE NR8950 Apache Commons Collections RMI Request Deserialization privilege escalation
6620| [107084] Apache Struts up to 2.3.19 cross site scripting
6621| [106877] Apache Struts up to 2.0.33/2.5.10 Freemarker Tag privilege escalation
6622| [106875] Apache Struts up to 2.5.5 URL Validator denial of service
6623| [106874] Apache Struts up to 2.3.30 Convention Plugin directory traversal
6624| [106847] Apache Tomcat up to 7.0.80 VirtualDirContext Source information disclosure
6625| [106846] Apache Tomcat up to 7.0.79 on Windows HTTP PUT Method Parameter File Upload privilege escalation
6626| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
6627| [106739] puppetlabs-apache up to 1.11.0/2.0.x weak authentication
6628| [106720] Apache Wicket up to 1.5.12/6.18.x/7.0.0-M4 CryptoMapper privilege escalation
6629| [106586] Apache Brooklyn up to 0.9.x REST Server cross site scripting
6630| [106562] Apache Spark up to 2.1.1 Launcher API Deserialization privilege escalation
6631| [106559] Apache Brooklyn up to 0.9.x SnakeYAML YAML Data Java privilege escalation
6632| [106558] Apache Brooklyn up to 0.9.x REST Server cross site request forgery
6633| [106556] Apache Traffic Server up to 5.3.1 HTTP2 unknown vulnerability
6634| [106555] Apache Traffic Server up to 5.3.1 HTTP2 unknown vulnerability
6635| [106171] Apache Directory LDAP API up to 1.0.0-M30 Timing unknown vulnerability
6636| [106167] Apache Struts up to 2.5.12 REST Plugin XML Data privilege escalation
6637| [106166] Apache Struts up to 2.3.33/2.5.12 REST Plugin denial of service
6638| [106165] Apache Struts up to 2.3.33/2.5.12 URLValidator Regex CPU Exhaustion denial of service
6639| [106115] Apache Hadoop up to 2.6.4/2.7.2 YARN NodeManager Password information disclosure
6640| [106012] Apache Solr up to 5.5.3/6.4.0 Replication directory traversal
6641| [105980] Apache Engine 16.11.01 Parameter Reflected unknown vulnerability
6642| [105962] Apache Atlas 0.6.0/0.7.0 Frame cross site scripting
6643| [105961] Apache Atlas 0.6.0/0.7.0 Stack Trace information disclosure
6644| [105960] Apache Atlas 0.6.0/0.7.0 Search Reflected cross site scripting
6645| [105959] Apache Atlas 0.6.0/0.7.0 edit Tag DOM cross site scripting
6646| [105958] Apache Atlas 0.6.0/0.7.0 edit Tag Stored cross site scripting
6647| [105957] Apache Atlas 0.6.0/0.7.0 Cookie privilege escalation
6648| [105905] Apache Atlas 0.6.0/0.7.0/0.7.1 /js privilege escalation
6649| [105878] Apache Struts up to 2.3.24.0 privilege escalation
6650| [105682] Apache2Triad 1.5.4 phpsftpd/users.php Parameter cross site scripting
6651| [105681] Apache2Triad 1.5.4 phpsftpd/users.php Request cross site request forgery
6652| [105680] Apache2Triad 1.5.4 Parameter Session Fixation weak authentication
6653| [105643] Apache Pony Mail up to 0.8b weak authentication
6654| [105288] Apache Sling up to 2.3.21 Sling.evalString() String cross site scripting
6655| [105219] Apache Tomcat up to 8.5.15/9.0.0.M21 HTTP2 Bypass directory traversal
6656| [105218] Apache Tomcat up to 7.0.78/8.0.44/8.5.15/9.0.0.M21 CORS Filter Cache Poisoning privilege escalation
6657| [105215] Apache CXF up to 3.0.12/3.1.9 OAuth2 Hawk/JOSE MAC Validation Timing unknown vulnerability
6658| [105206] Apache CXF up to 3.0.11/3.1.8 JAX-RS Module XML External Entity
6659| [105205] Apache CXF up to 3.0.11/3.1.8 HTTP Transport Module Parameter cross site scripting
6660| [105202] Apache Storm 1.0.0/1.0.1/1.0.2/1.0.3/1.1.0 Worker privilege escalation
6661| [104987] Apache Xerces-C++ XML Service CPU Exhaustion denial of service
6662| [104986] Apache CXF 2.4.5/2.5.1 WS-SP UsernameToken Policy SOAP Request weak authentication
6663| [104985] Apache MyFaces Core up to 2.1.4 EL Expression Parameter Injection information disclosure
6664| [104983] Apache Wink up to 1.1.1 XML Document xxe privilege escalation
6665| [104981] Apache Commons Email 1.0/1.1/1.2/1.3/1.4 Subject Linebreak SMTP privilege escalation
6666| [104591] MEDHOST Document Management System Apache Solr Default Credentials weak authentication
6667| [104062] Oracle MySQL Enterprise Monitor up to 3.3.3.1199 Apache Tomcat unknown vulnerability
6668| [104061] Oracle MySQL Enterprise Monitor up to 3.2.7.1204/3.3.3.1199 Apache Tomcat unknown vulnerability
6669| [104060] Oracle MySQL Enterprise Monitor up to 3.1.5.7958/3.2.5.1141/3.3.2.1162 Apache Struts 2 unknown vulnerability
6670| [103995] Oracle 8.3/8.4/15.1/15.2 Apache Trinidad unknown vulnerability
6671| [103993] Oracle Policy Automation up to 12.2.3 Apache Commons FileUplaod denial of service
6672| [103916] Oracle Banking Platform 2.3/2.4/2.4.1/2.5 Apache Commons FileUpload denial of service
6673| [103906] Oracle Communications BRM 11.2.0.0.0 Apache Commons Collections privilege escalation
6674| [103904] Oracle Communications BRM 11.2.0.0.0/11.3.0.0.0 Apache Groovy memory corruption
6675| [103866] Oracle Transportation Management 6.1/6.2 Apache Webserver unknown vulnerability
6676| [103816] Oracle BI Publisher 11.1.1.9.0/12.2.1.1.0/12.2.1.2.0 Apache Commons Fileupload denial of service
6677| [103797] Oracle Tuxedo System and Applications Monitor Apache Commons Collections privilege escalation
6678| [103792] Oracle Enterprise Data Quality 8.1.13.0.0 Apache Commons Fileupload privilege escalation
6679| [103791] Oracle Endeca Server 7.6.0.0/7.6.1.0 Apache Commons Collections privilege escalation
6680| [103788] Oracle Enterprise Repository 11.1.1.7.0/12.1.3.0.0 Apache ActiveMQ memory corruption
6681| [103787] Oracle Enterprise Data Quality 8.1.13.0.0 Apache Groovy memory corruption
6682| [103763] Apache Sling up to 1.0.11 XSS Protection API XSS.getValidXML() Application XML External Entity
6683| [103762] Apache Sling up to 1.0.12 XSS Protection API XSSAPI.encodeForJSString() Script Tag cross site scripting
6684| [103693] Apache OpenMeetings 1.0.0 HTTP Method privilege escalation
6685| [103692] Apache OpenMeetings 1.0.0 Tomcat Error information disclosure
6686| [103691] Apache OpenMeetings 3.2.0 Parameter privilege escalation
6687| [103690] Apache OpenMeetings 1.0.0 sql injection
6688| [103689] Apache OpenMeetings 1.0.0 crossdomain.xml privilege escalation
6689| [103688] Apache OpenMeetings 1.0.0 weak encryption
6690| [103687] Apache OpenMeetings 1.0.0 cross site request forgery
6691| [103556] Apache Roller 5.1.0/5.1.1 Weblog Page Template VTL privilege escalation
6692| [103554] Apache OpenMeetings 1.0.0 Password Update unknown vulnerability
6693| [103553] Apache OpenMeetings 1.0.0 File Upload privilege escalation
6694| [103552] Apache OpenMeetings 3.2.0 Chat cross site scripting
6695| [103551] Apache OpenMeetings 3.1.0 XML unknown vulnerability
6696| [103521] Apache HTTP Server 2.4.26 HTTP2 Free memory corruption
6697| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
6698| [103519] Apache Struts up to 2.5.11/2.3.32 Spring AOP denial of service
6699| [103518] Apache Struts up to 2.5.11 URLValidator directory traversal
6700| [103492] Apache Spark up to 2.1.x Web UI Reflected cross site scripting
6701| [103401] Apache Struts 2.3.x Struts 1 Plugin ActionMessage privilege escalation
6702| [103399] Apache Traffic Control Traffic Router TCP Connection Slowloris denial of service
6703| [103387] Apache Impala up to 2.8.0 StatestoreSubscriber weak encryption
6704| [103386] Apache Impala up to 2.7.x/2.8.0 Kerberos weak authentication
6705| [103352] Apache Solr Node weak authentication
6706| [102897] Apache Ignite up to 2.0 Update Notifier information disclosure
6707| [102878] Code42 CrashPlan 5.4.x RMI Server org.apache.commons.ssl.rmi.DateRMI privilege escalation
6708| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
6709| [102697] Apache HTTP Server 2.2.24/2.2.32 HTTP Strict Parsing ap_find_token Request Header memory corruption
6710| [102690] Apache HTTP Server up to 2.2.32/2.4.25 mod_ssl ap_hook_process_connection() denial of service
6711| [102689] Apache HTTP Server up to 2.2.32/2.4.25 ap_get_basic_auth_pw weak authentication
6712| [102622] Apache Thrift up to 0.9.2 Client Libraries skip denial of service
6713| [102538] Apache Ranger up to 0.7.0 Authorizer unknown vulnerability
6714| [102537] Apache Ranger up to 0.7.0 Wildcard Character unknown vulnerability
6715| [102536] Apache Ranger up to 0.6 Stored cross site scripting
6716| [102535] Apache Ranger up to 0.6.2 Policy Engine unknown vulnerability
6717| [102255] Apache NiFi up to 0.7.3/1.2.x Response Header privilege escalation
6718| [102254] Apache NiFi up to 0.7.3/1.2.x UI cross site scripting
6719| [102070] Apache CXF Fediz up to 1.1.2/1.2.0 Application Plugin denial of service
6720| [102020] Apache Tomcat up to 9.0.0.M1 Java Servlet HTTP Method unknown vulnerability
6721| [101858] Apache Hive up to 1.2.1/2.0.0 Client weak authentication
6722| [101802] Apache KNOX up to 0.11.0 WebHDFS privilege escalation
6723| [101928] HPE Aruba ClearPass Apache Tomcat information disclosure
6724| [101524] Apache Archiva up to 1.x/2.2.1 REST Endpoint cross site request forgery
6725| [101513] Apache jUDDI 3.1./3.1.2/3.1.3/3.1.4 Logout Open Redirect
6726| [101430] Apache CXF Fediz up to 1.3.1 OIDC Service cross site request forgery
6727| [101429] Apache CXF Fediz up to 1.2.3/1.3.1 Plugins cross site request forgery
6728| [100619] Apache Hadoop up to 2.6.x HDFS Servlet unknown vulnerability
6729| [100618] Apache Hadoop up to 2.7.0 HDFS Web UI cross site scripting
6730| [100621] Adobe ColdFusion 10/11/2016 Apache BlazeDS Library Deserialization privilege escalation
6731| [100205] Oracle MySQL Enterprise Monitor up to 3.1.6.8003/3.2.1182/3.3.2.1162 Apache Commons FileUpload denial of service
6732| [100191] Oracle Secure Global Desktop 4.71/5.2/5.3 Web Server (Apache HTTP Server) information disclosure
6733| [100162] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Commons Collections privilege escalation
6734| [100160] Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 Apache Trinidad unknown vulnerability
6735| [99969] Oracle WebCenter Sites 11.1.1.8.0 Apache Tomcat memory corruption
6736| [99937] Apache Batik up to 1.8 privilege escalation
6737| [99936] Apache FOP up to 2.1 privilege escalation
6738| [99935] Apache CXF up to 3.0.12/3.1.10 STSClient Cache information disclosure
6739| [99934] Apache CXF up to 3.0.12/3.1.10 JAX-RS XML Security Streaming Client spoofing
6740| [99930] Apache Traffic Server up to 6.2.0 denial of service
6741| [99929] Apache Log4j up to 2.8.1 Socket Server Deserialization privilege escalation
6742| [99925] Apache Traffic Server 6.0.0/6.1.0/6.2.0 HPACK Bomb denial of service
6743| [99738] Ping Identity OpenID Connect Authentication Module up to 2.13 on Apache Mod_auth_openidc.c spoofing
6744| [117569] Apache Hadoop up to 2.7.3 privilege escalation
6745| [99591] Apache TomEE up to 1.7.3/7.0.0-M2 EjbObjectInputStream Serialized Object privilege escalation
6746| [99370] Apache Ignite up to 1.8 update-notifier Document XML External Entity
6747| [99299] Apache Geode up to 1.1.0 Pulse OQL Query privilege escalation
6748| [99572] Apache Tomcat up to 7.0.75/8.0.41/8.5.11/9.0.0.M17 Application Listener privilege escalation
6749| [99570] Apache Tomcat up to 6.0.52/7.0.76/8.0.42/8.5.12/9.0.0.M18 HTTP Connector Cache information disclosure
6750| [99569] Apache Tomcat up to 6.0.52/7.0.76/8.0.42/8.5.12/9.0.0.M18 HTTP/2 GOAWAY Frame Resource Exhaustion denial of service
6751| [99568] Apache Tomcat up to 6.0.52/7.0.76/8.0.42/8.5.12/9.0.0.M18 Pipelined Request information disclosure
6752| [99048] Apache Ambari up to 2.3.x REST API Shell Metacharacter privilege escalation
6753| [99014] Apache Camel Jackson/JacksonXML privilege escalation
6754| [98610] Apple macOS up to 10.12.3 apache_mod_php memory corruption
6755| [98609] Apple macOS up to 10.12.3 apache_mod_php denial of service
6756| [98608] Apple macOS up to 10.12.3 apache_mod_php memory corruption
6757| [98607] Apple macOS up to 10.12.3 apache_mod_php denial of service
6758| [98606] Apple macOS up to 10.12.3 apache_mod_php denial of service
6759| [98605] Apple macOS up to 10.12.3 Apache denial of service
6760| [98604] Apple macOS up to 10.12.3 Apache denial of service
6761| [98603] Apple macOS up to 10.12.3 Apache denial of service
6762| [98602] Apple macOS up to 10.12.3 Apache denial of service
6763| [98601] Apple macOS up to 10.12.3 Apache denial of service
6764| [98517] Apache POI up to 3.14 OOXML File XXE denial of service
6765| [98405] Apache Hadoop up to 0.23.10 privilege escalation
6766| [98199] Apache Camel Validation XML External Entity
6767| [97892] Apache Tomcat up to 9.0.0.M15 Reverse-Proxy Http11InputBuffer.java information disclosure
6768| [97617] Apache Camel camel-snakeyaml Deserialization privilege escalation
6769| [97602] Apache Camel camel-jackson/camel-jacksonxml CamelJacksonUnmarshalType privilege escalation
6770| [97732] Apache Struts up to 2.3.31/2.5.10 Jakarta Multipart Parser Content-Type privilege escalation
6771| [97466] mod_auth_openidc up to 2.1.5 on Apache weak authentication
6772| [97455] mod_auth_openidc up to 2.1.4 on Apache weak authentication
6773| [97081] Apache Tomcat HTTPS Request denial of service
6774| [97162] EMC OpenText Documentum D2 BeanShell/Apache Commons privilege escalation
6775| [96949] Hanwha Techwin Smart Security Manager up to 1.5 Redis/Apache Felix Gogo privilege escalation
6776| [96314] Apache Cordova up to 6.1.1 on Android weak authentication
6777| [95945] Apple macOS up to 10.12.2 apache_mod_php denial of service
6778| [95944] Apple macOS up to 10.12.2 apache_mod_php denial of service
6779| [95943] Apple macOS up to 10.12.2 apache_mod_php memory corruption
6780| [95666] Oracle FLEXCUBE Direct Banking 12.0.0/12.0.1/12.0.2/12.0.3 Apache Commons Collections privilege escalation
6781| [95455] Apache NiFi up to 1.0.0/1.1.0 Connection Details Dialogue cross site scripting
6782| [95311] Apache Storm UI Daemon privilege escalation
6783| [95291] ZoneMinder 1.30.0 Apache httpd privilege escalation
6784| [94800] Apache Wicket up to 1.5.16/6.24.x Deserialize DiskFileItem denial of service
6785| [94705] Apache Qpid Broker for Java up to 6.1.0 SCRAM-SHA-1/SCRAM-SHA-256 User information disclosure
6786| [94627] Apache HTTP Server up to 2.4.24 mod_auth_digest Crash denial of service
6787| [94626] Apache HTTP Server up to 2.4.24 mod_session_crypto Padding weak encryption
6788| [94625] Apache HTTP Server up to 2.4.24 Response Split privilege escalation
6789| [94540] Apache Tika 1.9 tika-server File information disclosure
6790| [94600] Apache ActiveMQ up to 5.14.1 Administration Console cross site scripting
6791| [94348] Apple macOS up to 10.12.1 apache_mod_php denial of service
6792| [94347] Apple macOS up to 10.12.1 apache_mod_php denial of service
6793| [94346] Apple macOS up to 10.12.1 apache_mod_php denial of service
6794| [94345] Apple macOS up to 10.12.1 apache_mod_php denial of service
6795| [94344] Apple macOS up to 10.12.1 apache_mod_php denial of service
6796| [94343] Apple macOS up to 10.12.1 apache_mod_php memory corruption
6797| [94342] Apple macOS up to 10.12.1 apache_mod_php memory corruption
6798| [94128] Apache Tomcat up to 9.0.0.M13 Error information disclosure
6799| [93958] Apache HTTP Server up to 2.4.23 mod_http2 h2_stream.c denial of service
6800| [93874] Apache Subversion up to 1.8.16/1.9.4 mod_dontdothat XXE denial of service
6801| [93855] Apache Hadoop up to 2.6.4/2.7.2 HDFS Service privilege escalation
6802| [93609] Apache OpenMeetings 3.1.0 RMI Registry privilege escalation
6803| [93555] Apache Tika 1.6-1.13 jmatio MATLAB File privilege escalation
6804| [93799] Apache Tomcat up to 6.0.47/7.0.72/8.0.38/8.5.6/9.0.0.M11 JmxRemoteLifecycleListener privilege escalation
6805| [93798] Apache Tomcat up to 6.0.47/7.0.72/8.0.38/8.5.6/9.0.0.M11 JmxRemoteLifecycleListener privilege escalation
6806| [93797] Apache Tomcat up to 6.0.47/7.0.72/8.0.38/8.5.6/9.0.0.M11 HTTP Split privilege escalation
6807| [93796] Apache Tomcat up to 8.5.6/9.0.0.M11 HTTP/2 Header Parser denial of service
6808| [93532] Apache Commons Collections Library Java privilege escalation
6809| [93210] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 ResourceLinkFactory privilege escalation
6810| [93209] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 Realm Authentication User information disclosure
6811| [93208] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 System Property Replacement information disclosure
6812| [93207] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 Utility Method privilege escalation
6813| [93206] Apache Tomcat up to 6.0.45/7.0.70/8.0.36/8.5.4/9.0.0.M9 Configuration privilege escalation
6814| [93098] Apache Commons FileUpload privilege escalation
6815| [92987] Oracle Virtual Desktop Infrastructure up to 3.5.2 Apache Commons Collection memory corruption
6816| [92986] Oracle Virtual Desktop Infrastructure up to 3.5.2 Apache Tomcat memory corruption
6817| [92982] Oracle Insurance IStream 4.3.2 Apache Commons Collections memory corruption
6818| [92981] Oracle Financial Services Lending and Leasing 14.1.0/14.2.0 Apache Commons Collections memory corruption
6819| [92979] Oracle up to 8.0.3 Apache Commons Collections memory corruption
6820| [92977] Oracle FLEXCUBE Universal Banking up to 12.2.0 Apache Commons Collections memory corruption
6821| [92976] Oracle FLEXCUBE Universal Banking 12.87.1/12.87.2 Apache Commons Collections memory corruption
6822| [92975] Oracle FLEXCUBE Private Banking up to 12.1.0 Apache Commons Collections memory corruption
6823| [92974] Oracle FLEXCUBE Investor Servicing 12.0.1 Apache Commons Collections memory corruption
6824| [92973] Oracle 12.0.0/12.1.0 Apache Commons Collections memory corruption
6825| [92972] Oracle FLEXCUBE Core Banking 11.5.0.0.0/11.6.0.0.0 Apache Commons Collections memory corruption
6826| [92962] Oracle Agile PLM 9.3.4/9.3.5 Apache Commons Collections memory corruption
6827| [92909] Oracle Agile PLM 9.3.4/9.3.5 Apache Tomcat unknown vulnerability
6828| [92786] Oracle Banking Digital Experience 15.1 Apache Commons Collections information disclosure
6829| [92549] Apache Tomcat on Red Hat privilege escalation
6830| [92509] Apache Tomcat JK ISAPI Connector up to 1.2.41 jk_uri_worker_map.c memory corruption
6831| [92314] Apache MyFaces Trinidad up to 1.0.13/1.2.15/2.0.1/2.1.1 CoreResponseStateManager memory corruption
6832| [92313] Apache Struts2 up to 2.3.28/2.5.0 Action Name Cleanup cross site request forgery
6833| [92299] Apache Derby up to 10.12.1.0 SqlXmlUtil XML External Entity
6834| [92217] Apache ActiveMQ Artemis up to 1.3.x Broker/REST GetObject privilege escalation
6835| [92174] Apache Ranger up to 0.6.0 Policy cross site scripting
6836| [91831] Apache Jackrabbit up to 2.13.2 HTTP Header cross site request forgery
6837| [91825] Apache Zookeeper up to 3.4.8/3.5.2 C CLI Shell memory corruption
6838| [91818] Apache CXF Fediz up to 1.2.2/1.3.0 Application Plugin privilege escalation
6839| [92056] Apple macOS up to 10.11 apache_mod_php memory corruption
6840| [92055] Apple macOS up to 10.11 apache_mod_php memory corruption
6841| [92054] Apple macOS up to 10.11 apache_mod_php denial of service
6842| [92053] Apple macOS up to 10.11 apache_mod_php denial of service
6843| [92052] Apple macOS up to 10.11 apache_mod_php denial of service
6844| [92051] Apple macOS up to 10.11 apache_mod_php memory corruption
6845| [92050] Apple macOS up to 10.11 apache_mod_php denial of service
6846| [92049] Apple macOS up to 10.11 apache_mod_php memory corruption
6847| [92048] Apple macOS up to 10.11 apache_mod_php denial of service
6848| [92047] Apple macOS up to 10.11 apache_mod_php memory corruption
6849| [92046] Apple macOS up to 10.11 apache_mod_php memory corruption
6850| [92045] Apple macOS up to 10.11 apache_mod_php memory corruption
6851| [92044] Apple macOS up to 10.11 apache_mod_php memory corruption
6852| [92043] Apple macOS up to 10.11 apache_mod_php denial of service
6853| [92042] Apple macOS up to 10.11 apache_mod_php memory corruption
6854| [92041] Apple macOS up to 10.11 apache_mod_php memory corruption
6855| [92040] Apple macOS up to 10.11 Apache Proxy privilege escalation
6856| [91785] Apache Shiro up to 1.3.1 Servlet Filter privilege escalation
6857| [90879] Apache OpenMeetings up to 3.1.1 SWF Panel cross site scripting
6858| [90878] Apache Sentry up to 1.6.x Blacklist Filter reflect/reflect2/java_method privilege escalation
6859| [90610] Apache POI up to 3.13 XLSX2CSV Example OpenXML Document XML External Entity
6860| [90584] Apache ActiveMQ up to 5.11.3/5.12.2/5.13/1 Administration Web Console privilege escalation
6861| [90385] Apache Archiva up to 1.3.9 addProxyConnector_commit.action cross site scripting
6862| [90384] Apache Archiva up to 1.3.9 addProxyConnector_commit.action cross site request forgery
6863| [90383] Apache OpenOffice up to 4.1.2 Impress File memory corruption
6864| [89670] Apache Tomcat up to 8.5.4 CGI Servlet Environment Variable Open Redirect
6865| [89669] Apache HTTP Server up to 2.4.23 RFC 3875 Namespace Conflict Environment Variable Open Redirect
6866| [89726] Apple Mac OS X up to 10.11.5 apache_mod_php memory corruption
6867| [89484] Apache Qpid up to 0.13.0 on Windows Proton Library Certificate weak authentication
6868| [89473] HPE iMC PLAT/EAD/APM/iMC NTA/iMC BIMS/iMC UAM_TAM up to 7.2 Apache Commons Collections Library Command privilege escalation
6869| [90263] Apache Archiva Header denial of service
6870| [90262] Apache Archiva Deserialize privilege escalation
6871| [90261] Apache Archiva XML DTD Connection privilege escalation
6872| [88827] Apache Xerces-C++ up to 3.1.3 DTD Stack-Based memory corruption
6873| [88747] Apache HTTP Server 2.4.17/2.4.18 mod_http2 denial of service
6874| [88608] Apache Struts up to 2.3.28.1/2.5.0 URLValidator Null Value denial of service
6875| [88607] Apache Struts up to 2.3.28.1 REST Plugin Expression privilege escalation
6876| [88606] Apache Struts up to 2.3.28.1 Restriction privilege escalation
6877| [88605] Apache Struts up to 2.3.28.1 Restriction privilege escalation
6878| [88604] Apache Struts up to 2.3.28.1 Token Validator cross site request forgery
6879| [88603] Apache Commons FileUpload up to 1.3.1 MultipartStream denial of service
6880| [88602] Apache Struts up to 1.3.10 ActionServlet.java cross site scripting
6881| [88601] Apache Struts up to 1.3.10 Multithreading ActionServlet.java memory corruption
6882| [88600] Apache Struts up to 1.3.10 MultiPageValidator privilege escalation
6883| [89005] Apache Qpid AMQP JMS Client getObject privilege escalation
6884| [87888] Apache Ranger up to 0.5.2 Policy Admin Tool eventTime sql injection
6885| [87835] Apache CloudStack up to 4.5.2.0/4.6.2.0/4.7.1.0/4.8.0.0 SAML-based Authentication privilege escalation
6886| [87806] HPE Discovery and Dependency Mapping Inventory up to 9.32 update 3 Apache Commons Collections Library privilege escalation
6887| [87805] HPE Universal CMDB up to 10.21 Apache Commons Collections Library privilege escalation
6888| [87768] Apache Shiro up to 1.2.4 Cipher Key privilege escalation
6889| [87765] Apache James Server 2.3.2 Command privilege escalation
6890| [88667] Apache HTTP Server up to 2.4.20 mod_http2 Certificate weak authentication
6891| [87718] Apache Struts up to 2.3.24.1 OGNL Caching denial of service
6892| [87717] Apache Struts up to 2.3.28 REST Plugin privilege escalation
6893| [87706] Apache Qpid Java up to 6.0.2 AMQP privilege escalation
6894| [87703] Apache Qbid Java up to 6.0.2 PlainSaslServer.java denial of service
6895| [87702] Apache ActiveMQ up to 5.13.x Fileserver Web Application Upload privilege escalation
6896| [87700] Apache PDFbox up to 1.8.11/2.0.0 XML Parser PDF Document XML External Entity
6897| [87679] HP Release Control 9.13/9.20/9.21 Apache Commons Collections Library Java Object privilege escalation
6898| [87540] Apache Ambari up to 2.2.0 File Browser View information disclosure
6899| [87433] Apple Mac OS X up to 10.11.4 apache_mod_php memory corruption
6900| [87432] Apple Mac OS X up to 10.11.4 apache_mod_php memory corruption
6901| [87431] Apple Mac OS X up to 10.11.4 apache_mod_php Format String
6902| [87430] Apple Mac OS X up to 10.11.4 apache_mod_php denial of service
6903| [87429] Apple Mac OS X up to 10.11.4 apache_mod_php information disclosure
6904| [87428] Apple Mac OS X up to 10.11.4 apache_mod_php memory corruption
6905| [87427] Apple Mac OS X up to 10.11.4 apache_mod_php memory corruption
6906| [87389] Apache Xerces C++ up to 3.1.3 XML Document DTDScanner.cpp memory corruption
6907| [87172] Adobe ColdFusion 11 Update 7/2016/up to 10 Update 18 Apache Commons Collections Library privilege escalation
6908| [87121] Apache Cordova iOS up to 3.x Plugin privilege escalation
6909| [87120] Apache Cordova iOS up to 3.x URL Whitelist privilege escalation
6910| [83806] HPE Network Node Manager i up to 10.01 Apache Commons Collections Library privilege escalation
6911| [83077] Apache Subversion up to 1.8.15/1.9.3 mod_authz_svn mod_authz_svn.c denial of service
6912| [83076] Apache Subversion up to 1.8.15/1.9.3 svnserve svnserve/cyrus_auth.c privilege escalation
6913| [82790] Apache Struts 2.0.0/2.3.24/2.3.28 Dynamic Method privilege escalation
6914| [82789] Apache Struts 2.0.0/2.3.24/2.3.28 XSLTResult privilege escalation
6915| [82725] HPE P9000 Command View up to 7.x/8.4.0 Apache Commons Collections Library privilege escalation
6916| [82444] Apache Camel up to 2.14.x/2.15.4/2.16.0 HTTP Request privilege escalation
6917| [82389] Apache Subversion up to 1.7.x/1.8.14/1.9.2 mod_dav_svn util.c memory corruption
6918| [82280] Apache Struts up to 1.7 JRE URLDecoder cross site scripting
6919| [82260] Apache OFBiz up to 12.04.05/13.07.02 Java Object privilege escalation
6920| [82259] Apache Qpid Proton up to 0.12.0 proton.reactor.Connector weak encryption
6921| [82250] Apache Ranger up to 0.5.0 Admin UI weak authentication
6922| [82214] Apache Wicket up to 1.5.14/6.21.x/7.1.x Input Element cross site scripting
6923| [82213] Apache Wicket up to 1.5.14/6.21.x/7.1.x ModalWindow Title getWindowOpenJavaScript cross site scripting
6924| [82212] Apache Ranger up to 0.5.0 Policy Admin Tool privilege escalation
6925| [82211] Apache OFBiz up to 12.04.06/13.07.02 ModelFormField.java DisplayEntityField.getDescription cross site scripting
6926| [82082] Apache JetSpeed up to 2.3.0 User Manager Service privilege escalation
6927| [82081] Apache OpenMeetings up to 3.1.0 SOAP API information disclosure
6928| [82080] Apache OpenMeetings up to 3.1.0 Event cross site scripting
6929| [82078] Apache OpenMeetings up to 3.1.0 Import/Export System Backup ZIP Archive directory traversal
6930| [82077] Apache OpenMeetings up to 3.1.0 Password Reset sendHashByUser privilege escalation
6931| [82076] Apache Ranger up to 0.5.1 privilege escalation
6932| [82075] Apache JetSpeed up to 2.3.0 Portal cross site scripting
6933| [82074] Apache JetSpeed up to 2.3.0 cross site scripting
6934| [82073] Apache JetSpeed up to 2.3.0 User Manager Service sql injection
6935| [82072] Apache JetSpeed up to 2.3.0 Portal Site Manager ZIP Archive directory traversal
6936| [82058] Apache LDAP Studio/Directory Studio up to 2.0.0-M9 CSV Export privilege escalation
6937| [82053] Apache Ranger up to 0.4.x Policy Admin Tool privilege escalation
6938| [82052] Apache Ranger up to 0.4.x Policy Admin Tool HTTP Request cross site scripting
6939| [81696] Apache ActiveMQ up to 5.13.1 HTTP Header privilege escalation
6940| [81695] Apache Xerces-C up to 3.1.2 internal/XMLReader.cpp memory corruption
6941| [81622] HPE Asset Manager 9.40/9.41/9.50 Apache Commons Collections Library Java Object privilege escalation
6942| [81406] HPE Service Manager up to 9.35 P3/9.41 P1 Apache Commons Collections Library Command privilege escalation
6943| [81405] HPE Operations Orchestration up to 10.50 Apache Commons Collections Library Command privilege escalation
6944| [81427] Apple Mac OS X up to 10.11.3 apache_mod_php PNG File memory corruption
6945| [81426] Apple Mac OS X up to 10.11.3 apache_mod_php PNG File memory corruption
6946| [81372] Apache Struts up to 2.3.24.1 I18NInterceptor cross site scripting
6947| [81371] Apache Struts up to 2.3.24.1 Double OGNL Evaluation privilege escalation
6948| [81370] Apache Struts up to 2.3.24.1 Java URLDecoder cross site scripting
6949| [81084] Apache Tomcat 6.0/7.0/8.0/9.0 ServletContext directory traversal
6950| [81083] Apache Tomcat 7.0/8.0/9.0 Index Page cross site request forgery
6951| [81082] Apache Tomcat 7.0/8.0/9.0 ResourceLinkFactory.setGlobalContext privilege escalation
6952| [81081] Apache Tomcat 6.0/7.0/8.0/9.0 Error information disclosure
6953| [81080] Apache Tomcat 6.0/7.0/8.0/9.0 Session Persistence privilege escalation
6954| [81079] Apache Tomcat 6.0/7.0/8.0/9.0 StatusManagerServlet information disclosure
6955| [81078] Apache Tomcat 7.0/8.0/9.0 Session privilege escalation
6956| [80970] Apache Solr up to 5.3.0 Admin UI plugins.js cross site scripting
6957| [80969] Apache Solr up to 5.2 Schema schema-browser.js cross site scripting
6958| [80968] Apache Solr up to 5.0 analysis.js cross site scripting
6959| [80940] HP Continuous Delivery Automation 1.30 Apache Commons Collections Library privilege escalation
6960| [80823] Apache CloudStack up to 4.5.1 KVM Virtual Machine Migration privilege escalation
6961| [80822] Apache CloudStack up to 4.5.1 API Call information disclosure
6962| [80778] Apache Camel up to 2.15.4/2.16.0 camel-xstream privilege escalation
6963| [80750] HPE Operations Manager 8.x/9.0 on Windows Apache Commons Collections Library privilege escalation
6964| [80724] Apache Hive up to 1.2.1 Authorization Framework privilege escalation
6965| [80577] Oracle Secure Global Desktop 4.63/4.71/5.2 Apache HTTP Server denial of service
6966| [80165] Intel McAfee ePolicy Orchestrator up to 4.6.9/5.0.3/5.3.1 Apache Commons Collections Library privilege escalation
6967| [80116] Apache Subversion up to 1.9.2 svn Protocol libsvn_ra_svn/marshal.c read_string memory corruption
6968| [80115] Apache ActiveMQ up to 5.12.x Broker Service privilege escalation
6969| [80036] IBM Cognos Business Intelligence Apache Commons Collections Library InvokerTransformer privilege escalation
6970| [79873] VMware vCenter Operations/vRealize Orchestrator Apache Commons Collections Library Serialized Java Object privilege escalation
6971| [79840] Apache Cordova File Transfer Plugin up to 1.2.x on Android unknown vulnerability
6972| [79839] Apache TomEE Serialized Java Stream EjbObjectInputStream privilege escalation
6973| [79791] Cisco Products Apache Commons Collections Library privilege escalation
6974| [79539] Apple Mac OS X up to 10.11.1 apache_mod_php memory corruption
6975| [79538] Apple Mac OS X up to 10.11.1 apache_mod_php memory corruption
6976| [79294] Apache Cordova-Android up to 3.6 BridgeSecret Random Generator weak encryption
6977| [79291] Apache Cordova-Android up to 4.0 Javascript Whitelist privilege escalation
6978| [79244] Apache CXF up to 2.7.17/3.0.7/3.1.2 SAML Web SSO Module SAML Response weak authentication
6979| [79243] Oracle WebLogic Server 10.3.6.0/12.1.2.0/12.1.3.0/12.2.1.0 WLS Security com.bea.core.apache.commons.collections.jar privilege escalation
6980| [78989] Apache Ambari up to 2.1.1 Open Redirect
6981| [78988] Apache Ambari up to 2.0.1/2.1.0 Password privilege escalation
6982| [78987] Apache Ambari up to 2.0.x cross site scripting
6983| [78986] Apache Ambari up to 2.0.x Proxy Endpoint api/v1/proxy privilege escalation
6984| [78780] Apple Mac OS X up to 10.11.0 apache_mod_php denial of service
6985| [78779] Apple Mac OS X up to 10.11.0 apache_mod_php denial of service
6986| [78778] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
6987| [78777] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
6988| [78776] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
6989| [78775] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
6990| [78774] Apple Mac OS X up to 10.11.0 apache_mod_php memory corruption
6991| [78297] Apache Commons Components HttpClient up to 4.3.5 HTTPS Timeout denial of service
6992| [77406] Apache Flex BlazeDS AMF Message XML External Entity
6993| [77429] Apache ActiveMQ up to 5.10.0 LDAPLoginModule privilege escalation
6994| [77399] Apache ActiveMQ up to 5.10.0 LDAPLoginModule weak authentication
6995| [77375] Apache Tapestry up to 5.3.5 Client-Side Object Storage privilege escalation
6996| [77331] Apache ActiveMQ up to 5.11.1 on Windows Fileserver Upload/Download directory traversal
6997| [77299] Apache Solr Real-Time Module up to 7.x-1.1 Index Content information disclosure
6998| [77247] Apache ActiveMQ up to 5.10 TransportConnection.java processControlCommand denial of service
6999| [77083] Apache Groovy up to 2.4.3 MethodClosure.java MethodClosure memory corruption
7000| [76953] Apache Subversion 1.7.0/1.8.0/1.8.10 svn_repos_trace_node_locations information disclosure
7001| [76952] Apache Subversion 1.7.0/1.8.0/1.8.10 mod_authz_svn anonymous/authenticated information disclosure
7002| [76567] Apache Struts 2.3.20 unknown vulnerability
7003| [76733] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 ap_some_auth_required unknown vulnerability
7004| [76732] Apache HTTP Server 2.4.7/2.4.8/2.4.9/2.4.10/2.4.12 Request apr_brigade_flatten privilege escalation
7005| [76731] Apache HTTP Server 2.4.12 ErrorDocument 400 Crash denial of service
7006| [75690] Apache Camel up to 2.13.3/2.14.1 XPathBuilder.java XML External Entity
7007| [75689] Apache Camel up to 2.13.3/2.14.1 XML Converter Setup XmlConverter.java SAXSource privilege escalation
7008| [75668] Apache Sling API/Sling Servlets Post up to 2.2.1 HtmlResponse cross site scripting
7009| [75601] Apache Jackrabbit up to 2.10.0 WebDAV Request XML External Entity
7010| [75420] Apache Tomcat up to 6.0.43/7.0.58/8.0.16 Security Manager privilege escalation
7011| [75145] Apache OpenOffice up to 4.1.1 HWP Filter Crash denial of service
7012| [75032] Apache Tomcat Connectors up to 1.2.40 mod_jk privilege escalation
7013| [75135] PHP 5.4/5.5 HTTP Request sapi_apache2.c apache2handler privilege escalation
7014| [74793] Apache Tomcat File Upload denial of service
7015| [74708] Apple MacOS X up to 10.10.2 Apache denial of service
7016| [74707] Apple MacOS X up to 10.10.2 Apache denial of service
7017| [74706] Apple MacOS X up to 10.10.2 Apache memory corruption
7018| [74705] Apple MacOS X up to 10.10.2 Apache denial of service
7019| [74704] Apple MacOS X up to 10.10.2 Apache denial of service
7020| [74703] Apple MacOS X up to 10.10.2 Apache denial of service
7021| [74702] Apple MacOS X up to 10.10.2 Apache denial of service
7022| [74701] Apple MacOS X up to 10.10.2 Apache cross site request forgery
7023| [74700] Apple MacOS X up to 10.10.2 Apache unknown vulnerability
7024| [74661] Apache Flex up to 4.14.0 asdoc index.html cross site scripting
7025| [74609] Apache Cassandra up to 1.2.19/2.0.13/2.1.3 JMX/RMI Interface privilege escalation
7026| [74469] Apache Xerces-C up to 7.0 internal/XMLReader.cpp denial of service
7027| [74468] Apache Batik up to 1.6 denial of service
7028| [74414] Apache Mod-gnutls up to 0.5.1 Authentication spoofing
7029| [74371] Apache Standard Taglibs up to 1.2.0 memory corruption
7030| [74367] Apache HTTP Server up to 2.4.12 mod_lua lua_request.c wsupgrade denial of service
7031| [74174] Apache WSS4J up to 2.0.0 privilege escalation
7032| [74172] Apache ActiveMQ up to 5.5.0 Administration Console cross site scripting
7033| [69092] Apache Tomcat up to 6.0.42/7.0.54/8.0.8 HTTP Request Smuggling privilege escalation
7034| [73831] Apache Qpid up to 0.30 Access Restriction unknown vulnerability
7035| [73731] Apache XML Security unknown vulnerability
7036| [68660] Oracle BI Publisher 10.1.3.4.2/11.1.1.7 Apache Tomcat cross site scripting
7037| [73659] Apache CloudStack up to 4.3.0 Stack-Based unknown vulnerability
7038| [73593] Apache Traffic Server up to 5.1.0 denial of service
7039| [73511] Apache POI up to 3.10 Deadlock denial of service
7040| [73510] Apache Solr up to 4.3.0 cross site scripting
7041| [68447] Apache Subversion up to 1.7.18/1.8.10 mod_dav_svn Crash denial of service
7042| [68446] Apache Subversion up to 1.7.18/1.8.10 REPORT Request Crash denial of service
7043| [73173] Apache CloudStack Stack-Based unknown vulnerability
7044| [68357] Apache Struts up to 2.3.16.3 Random Number Generator cross site request forgery
7045| [73106] Apache Hadoop up to 2.4.0 Symlink privilege escalation
7046| [68575] Apache HTTP Server up to 2.4.10 LuaAuthzProvider mod_lua.c privilege escalation
7047| [72890] Apache Qpid 0.30 unknown vulnerability
7048| [72887] Apache Hive 0.13.0 File Permission privilege escalation
7049| [72878] Apache Cordova 3.5.0 cross site request forgery
7050| [72877] Apache Cordova 3.5.0 cross site request forgery
7051| [72876] Apache Cordova 3.5.0 cross site request forgery
7052| [68435] Apache HTTP Server 2.4.10 mod_proxy_fcgi.c handle_headers denial of service
7053| [68065] Apache CXF up to 3.0.1 JAX-RS SAML denial of service
7054| [68064] Apache CXF up to 3.0.0 SAML Token denial of service
7055| [67913] Oracle Retail Markdown Optimization 12.0/13.0/13.1/13.2/13.4 Apache commons-beanutils-1.8.0.jar memory corruption
7056| [67912] Oracle Retail Invoice Matching up to 14.0 Apache commons-beanutils-1.8.0.jar memory corruption
7057| [67911] Oracle Retail Clearance Optimization Engine 13.3/13.4/14.0 Apache commons-beanutils-1.8.0.jar memory corruption
7058| [67910] Oracle Retail Allocation up to 13.2 Apache commons-beanutils-1.8.0.jar memory corruption
7059| [71835] Apache Shiro 1.0.0/1.1.0/1.2.0/1.2.1/1.2.2 unknown vulnerability
7060| [71633] Apachefriends XAMPP 1.8.1 cross site scripting
7061| [71629] Apache Axis2/C spoofing
7062| [67633] Apple Mac OS X up to 10.9.4 apache_mod_php ext/standard/dns.c dns_get_record memory corruption
7063| [67631] Apple Mac OS X up to 10.9.4 apache_mod_php Symlink memory corruption
7064| [67630] Apple Mac OS X up to 10.9.4 apache_mod_php cdf_read_property_info denial of service
7065| [67629] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_count_chain denial of service
7066| [67628] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_check_stream_offset denial of service
7067| [67627] Apple Mac OS X up to 10.9.4 apache_mod_php softmagic.c mconvert memory corruption
7068| [67626] Apple Mac OS X up to 10.9.4 apache_mod_php softmagic.c denial of service
7069| [67625] Apple Mac OS X up to 10.9.4 apache_mod_php Crash denial of service
7070| [67624] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_read_property_info denial of service
7071| [67623] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_unpack_summary_info denial of service
7072| [67622] Apple Mac OS X up to 10.9.4 apache_mod_php cdf.c cdf_read_short_sector denial of service
7073| [67620] Apple Mac OS X up to 10.9.4 apache_mod_php magic/Magdir/commands denial of service
7074| [67790] Apache HTTP Server mod_cache NULL Pointer Dereference denial of service
7075| [67522] Apache Tomcat up to 7.0.39 JSP Upload privilege escalation
7076| [70809] Apache POI up to 3.11 Crash denial of service
7077| [70808] Apache POI up to 3.10 unknown vulnerability
7078| [70806] Apache Commons-httpclient 4.2/4.2.1/4.2.2 spoofing
7079| [70749] Apache Axis up to 1.4 getCN spoofing
7080| [70701] Apache Traffic Server up to 3.3.5 denial of service
7081| [70700] Apache OFBiz up to 12.04.03 cross site scripting
7082| [67402] Apache OpenOffice 4.0.0/4.0.1/4.1.0 Calc privilege escalation
7083| [67401] Apache OpenOffice up to 4.1.0 OLE Object information disclosure
7084| [70661] Apache Subversion up to 1.6.17 denial of service
7085| [70660] Apache Subversion up to 1.6.17 spoofing
7086| [70659] Apache Subversion up to 1.6.17 spoofing
7087| [67183] Apache HTTP Server up to 2.4.9 mod_proxy denial of service
7088| [67180] Apache HTTP Server up to 2.4.9 WinNT MPM Memory Leak denial of service
7089| [67185] Apache HTTP Server up to 2.4.9 mod_status Heap-Based memory corruption
7090| [67184] Apache HTTP Server 2.4.5/2.4.6 mod_cache NULL Pointer Dereference denial of service
7091| [67182] Apache HTTP Server up to 2.4.9 mod_deflate Memory Consumption denial of service
7092| [67181] Apache HTTP Server up to 2.4.9 mod_cgid denial of service
7093| [70338] Apache Syncope up to 1.1.7 unknown vulnerability
7094| [70295] Apache CXF up to 2.7.9 Cleartext information disclosure
7095| [70106] Apache Open For Business Project up to 10.04.0 getServerError cross site scripting
7096| [70105] Apache MyFaces up to 2.1.5 JavaServer Faces directory traversal
7097| [69846] Apache HBase up to 0.94.8 information disclosure
7098| [69783] Apache CouchDB up to 1.2.0 memory corruption
7099| [13383] Apache Tomcat up to 6.0.39/7.0.53/8.0.5 XML Parser privilege escalation
7100| [13300] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi setuid privilege escalation
7101| [13299] Apache HTTP Server 2.4.1/2.4.2 mod_wsgi Content-Type Header information disclosure
7102| [13164] Apache CXF up to 2.6.13/2.7.10 SOAP OutgoingChainInterceptor.java Invalid Content denial of service
7103| [13163] Apache CXF up to 2.6.13/2.7.10 SOAP HTML Content denial of service
7104| [13158] Apache Struts up to 2.3.16.2 ParametersInterceptor getClass privilege escalation
7105| [69515] Apache Struts up to 2.3.15.0 CookieInterceptor memory corruption
7106| [13086] Apache Struts up to 1.3.10 Class Loader privilege escalation
7107| [13067] Apache Struts up to 2.3.16.1 Class Loader privilege escalation
7108| [69431] Apache Archiva up to 1.3.6 cross site scripting
7109| [69385] Apache Syncope up to 1.1.6 unknown vulnerability
7110| [69338] Apache Xalan-Java up to 2.7.1 system-property unknown vulnerability
7111| [12742] Trustwave ModSecurity up to 2.7.5 Chunk Extension apache2/modsecurity.c modsecurity_tx_init privilege escalation
7112| [12741] Trustwave ModSecurity up to 2.7.6 Chunked HTTP Transfer apache2/modsecurity.c modsecurity_tx_init Trailing Header privilege escalation
7113| [13387] Apache Tomcat up to 6.0.39/7.0.53/8.0.5 Content-Length Header privilege escalation
7114| [13386] Apache Tomcat Security Manager up to 6.0.39/7.0.53/8.0.5 XSLT privilege escalation
7115| [13385] Apache Tomcat 8.0.0/8.0.1/8.0.3 AJP Request Zero Length denial of service
7116| [13384] Apache Tomcat up to 6.0.39/7.0.53/8.0.5 Chunked HTTP Request denial of service
7117| [12748] Apache CouchDB 1.5.0 UUIDS /_uuids denial of service
7118| [66739] Apache Camel up to 2.12.2 unknown vulnerability
7119| [66738] Apache Camel up to 2.12.2 unknown vulnerability
7120| [12667] Apache HTTP Server 2.4.7 mod_log_config.c log_cookie denial of service
7121| [66695] Apache CouchDB up to 1.2.0 cross site scripting
7122| [66694] Apache CouchDB up to 1.2.0 Partition partition2 directory traversal
7123| [66689] Apache HTTP Server up to 2.0.33 mod_dav dav_xml_get_cdata denial of service
7124| [12518] Apache Tomcat up to 6.0.38/7.0.49/8.0.0-RC9 HTTP Header denial of service
7125| [66498] Apache expressions up to 3.3.0 Whitelist unknown vulnerability
7126| [12781] Apache Struts up to 2.3.8 ParametersInterceptor getClass denial of service
7127| [12439] Apache Tomcat 6.0.33 XML XXE information disclosure
7128| [12438] Apache Tomcat 6.0.33/6.0.34/6.0.35/6.0.36/6.0.37 coyoteadapter.java disableURLRewriting privilege escalation
7129| [66356] Apache Wicket up to 6.8.0 information disclosure
7130| [12209] Apache Tomcat 7.0.0/7.0.50/8.0.0-RC1/8.0.1 Content-Type Header for Multi-Part Request Infinite Loop denial of service
7131| [66322] Apache ActiveMQ up to 5.8.0 cross site scripting
7132| [12291] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
7133| [66255] Apache Open For Business Project up to 10.04.3 cross site scripting
7134| [66200] Apache Hadoop up to 2.0.5 Security Feature information disclosure
7135| [66072] Apache CloudStack up to 4.2.0 Stack-Based unknown vulnerability
7136| [66068] Apache CloudStack up to 4.2.0 Stack-Based unknown vulnerability
7137| [11928] Oracle Secure Global Desktop up to 4.71 Apache Tomcat unknown vulnerability
7138| [11924] Oracle Secure Global Desktop up to 4.63 Apache Tomcat denial of service
7139| [11922] Oracle Secure Global Desktop up to 4.63 Apache Tomcat unknown vulnerability
7140| [66049] Apache XML Security for Java up to 1.4.6 Memory Consumption denial of service
7141| [12199] Apache Subversion up to 1.8.5 mod_dav_svn/repos.c get_resource denial of service
7142| [65946] askapache Firefox Adsense up to 3.0 askapache-firefox-adsense.php cross site request forgery
7143| [65668] Apache Solr 4.0.0 Updater denial of service
7144| [65665] Apache Solr up to 4.3.0 denial of service
7145| [65664] Apache Solr 3.6.0/3.6.1/3.6.2/4.0.0 Updater denial of service
7146| [65663] Apache Solr up to 4.5.1 ResourceLoader directory traversal
7147| [65658] Apache roller 4.0/4.0.1/5.0/5.0.1 unknown vulnerability
7148| [65657] Apache Roller 4.0/4.0.1/5.0/5.0.1 cross site scripting
7149| [11325] Apache Subversion 1.7.13 mod_dontdothat Bypass denial of service
7150| [11324] Apache Subversion up to 1.8.4 mod_dav_svn denial of service
7151| [11098] Apache Tomcat 5.5.25 HTTP Request cross site request forgery
7152| [65410] Apache Struts 2.3.15.3 cross site scripting
7153| [65386] Apache Solr up to 2.2.1 on TYPO3 cross site scripting
7154| [65385] Apache Solr up to 2.2.1 on TYPO3 unknown vulnerability
7155| [11044] Apache Struts 2.3.15.3 showConfig.action cross site scripting
7156| [11043] Apache Struts 2.3.15.3 actionNames.action cross site scripting
7157| [11018] cPanel WHM up to 11.40.0.11 Apache mod_userdir Tweak Interface privilege escalation
7158| [65342] Apache Sling 1.0.2/1.0.4/1.0.6/1.1.0/1.1.2 Auth Core cross site scripting
7159| [65340] Apache Shindig 2.5.0 information disclosure
7160| [65316] Apache Mod Fcgid up to 2.3.7 mod_fcgid fcgid_bucket.c fcgid_header_bucket_read memory corruption
7161| [65313] Apache Sling 2.2.0/2.3.0 AbstractCreateOperation.java deepGetOrCreateNode denial of service
7162| [10826] Apache Struts 2 File privilege escalation
7163| [65204] Apache Camel up to 2.10.1 unknown vulnerability
7164| [10460] Apache Struts 2.0.0/2.3.15.1 Action Mapping Mechanism Bypass privilege escalation
7165| [10459] Apache Struts 2.0.0/2.3.15 Dynamic Method Invocation unknown vulnerability
7166| [10160] Apache Subversion 1.8.0/1.8.1/1.8.2 svnwcsub.py handle_options race condition
7167| [10159] Apache Subversion up to 1.8.2 svnserve write_pid_file race condition
7168| [10158] Apache Subversion 1.8.0/1.8.1/1.8.2 daemonize.py daemon::daemonize race condition
7169| [10157] Apache Subversion up to 1.8.1 FSFS Repository Symlink privilege escalation
7170| [64808] Fail2ban up to 0.8.9 apache-auth.conf denial of service
7171| [64760] Best Practical RT up to 4.0.12 Apache::Session::File information disclosure
7172| [64722] Apache XML Security for C++ Heap-based memory corruption
7173| [64719] Apache XML Security for C++ Heap-based memory corruption
7174| [64718] Apache XML Security for C++ verify denial of service
7175| [64717] Apache XML Security for C++ getURIBaseTXFM memory corruption
7176| [64716] Apache XML Security for C++ spoofing
7177| [64701] Apache CXF up to 2.7.3 XML Parser Memory Consumption denial of service
7178| [64700] Apache CloudStack up to 4.1.0 Stack-Based cross site scripting
7179| [64667] Apache Open For Business Project up to 10.04.04 unknown vulnerability
7180| [64666] Apache Open For Business Project up to 10.04.04 cross site scripting
7181| [9891] Apache HTTP Server 2.2.22 suEXEC Feature .htaccess information disclosure
7182| [64509] Apache ActiveMQ up to 5.8.0 scheduled.jsp cross site scripting
7183| [9826] Apache Subversion up to 1.8.0 mod_dav_svn denial of service
7184| [9683] Apache HTTP Server 2.4.5 mod_session_dbd denial of service
7185| [64485] Apache Struts up to 2.2.3.0 privilege escalation
7186| [9568] Apache Struts up to 2.3.15 DefaultActionMapper cross site request forgery
7187| [9567] Apache Struts up to 2.3.15 DefaultActionMapper memory corruption
7188| [64467] Apache Geronimo 3.0 memory corruption
7189| [64466] Apache OpenJPA up to 2.2.1 Serialization memory corruption
7190| [64457] Apache Struts up to 2.2.3.0 cross site scripting
7191| [64326] Alejandro Garza Apachesolr Autocomplete up to 7.x-1.1 cross site scripting
7192| [9184] Apache Qpid up to 0.20 SSL misconfiguration
7193| [8935] Apache Subversion up to 1.7.9 FSFS Format Repository denial of service
7194| [8934] Apache Subversion up to 1.7.9 Svnserve Server denial of service
7195| [8933] Apache Subversion up to 1.6.21 check-mime-type.pl svnlook memory corruption
7196| [8932] Apache Subversion up to 1.6.21 svn-keyword-check.pl svnlook changed memory corruption
7197| [9022] Apache Struts up to 2.3.14.2 OGNL Expression memory corruption
7198| [8873] Apache Struts 2.3.14 privilege escalation
7199| [8872] Apache Struts 2.3.14 privilege escalation
7200| [8746] Apache HTTP Server Log File Terminal Escape Sequence Filtering mod_rewrite.c do_rewritelog privilege escalation
7201| [8666] Apache Tomcat up to 7.0.32 AsyncListener information disclosure
7202| [8665] Apache Tomcat up to 7.0.29 Chunked Transfer Encoding Extension Size denial of service
7203| [8664] Apache Tomcat up to 7.0.32 FORM Authentication weak authentication
7204| [64075] Apache Subversion up to 1.7.7 mod_dav_svn Crash denial of service
7205| [64074] Apache Subversion up to 1.7.8 mod_dav_svn NULL Pointer Dereference denial of service
7206| [64073] Apache Subversion up to 1.7.8 mod_dav_svn NULL Pointer Dereference denial of service
7207| [64072] Apache Subversion up to 1.7.7 mod_dav_svn NULL Pointer Dereference denial of service
7208| [64071] Apache Subversion up to 1.7.8 mod_dav_svn Memory Consumption denial of service
7209| [8768] Apache Struts up to 2.3.14 on Mac EL and OGNL Interpreter memory corruption
7210| [64006] Apache ActiveMQ up to 5.7.0 denial of service
7211| [64005] Apache ActiveMQ up to 5.7.0 Default Configuration denial of service
7212| [64004] Apache ActiveMQ up to 5.7.0 PortfolioPublishServlet.java cross site scripting
7213| [8427] Apache Tomcat Session Transaction weak authentication
7214| [63960] Apache Maven 3.0.4 Default Configuration spoofing
7215| [63751] Apache qpid up to 0.20 qpid::framing::Buffer denial of service
7216| [63750] Apache qpid up to 0.20 checkAvailable denial of service
7217| [63749] Apache Qpid up to 0.20 Memory Consumption denial of service
7218| [63748] Apache Qpid up to 0.20 Default Configuration denial of service
7219| [63747] Apache Rave up to 0.20 User Account information disclosure
7220| [7889] Apache Subversion up to 1.6.17 mod_dav_svn/svn_fs_file_length() denial of service
7221| [63646] Apache HTTP Server up to 2.2.23/2.4.3 mod_proxy_balancer.c balancer_handler cross site scripting
7222| [7688] Apache CXF up to 2.7.1 WSS4JInterceptor Bypass weak authentication
7223| [7687] Apache CXF up to 2.7.2 Token weak authentication
7224| [63334] Apache CXF up to 2.6.0 WS-Security unknown vulnerability
7225| [63299] Apache CXF up to 2.6.0 WS-Security unknown vulnerability
7226| [7202] Apache HTTP Server 2.4.2 on Oracle Solaris ld_library_path cross site scripting
7227| [7075] Apache Tomcat up to 6.0.35/7.0.27 NIO Connector NioEndpoint.java denial of service
7228| [7074] Apache Tomcat up to 6.0.35/7.0.29 FORM Authentication RealmBase.java weak authentication
7229| [7073] Apache Tomcat up to 6.0.35/7.0.31 CSRF Prevention Filter cross site request forgery
7230| [63090] Apache Tomcat up to 4.1.24 denial of service
7231| [63089] Apache HTTP Server up to 2.2.13 mod_proxy_ajp denial of service
7232| [62933] Apache Tomcat up to 5.5.0 Access Restriction unknown vulnerability
7233| [62929] Apache Tomcat up to 6.0.35/7.0.27 NIO Connector Memory Consumption denial of service
7234| [62833] Apache CXF -/2.6.0 spoofing
7235| [62832] Apache Axis2 up to 1.6.2 spoofing
7236| [62831] Apache Axis up to 1.4 Java Message Service spoofing
7237| [62830] Apache Commons-httpclient 3.0 Payments spoofing
7238| [62826] Apache Libcloud up to 0.11.0 spoofing
7239| [62757] Apache Open For Business Project up to 10.04.0 unknown vulnerability
7240| [8830] Red Hat JBoss Enterprise Application Platform 6.0.1 org.apache.catalina.connector.Response.encodeURL information disclosure
7241| [62661] Apache Axis2 unknown vulnerability
7242| [62658] Apache Axis2 unknown vulnerability
7243| [62467] Apache Qpid up to 0.17 denial of service
7244| [62417] Apache CXF 2.4.7/2.4.8/2.5.3/2.5.4/2.6.1 spoofing
7245| [6301] Apache HTTP Server mod_pagespeed cross site scripting
7246| [6300] Apache HTTP Server mod_pagespeed Hostname information disclosure
7247| [6123] Apache Wicket up to 1.5.7 Ajax Link cross site scripting
7248| [62035] Apache Struts up to 2.3.4 denial of service
7249| [61916] Apache QPID 0.5/0.6/0.14/0.16 unknown vulnerability
7250| [6998] Apache Tomcat 5.5.35/6.0.35/7.0.28 DIGEST Authentication Session State Caching privilege escalation
7251| [6997] Apache Tomcat 5.5.35/6.0.35/7.0.28 HTTP Digest Authentication Implementation privilege escalation
7252| [6092] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_ajp.c information disclosure
7253| [6090] Apache HTTP Server 2.4.0/2.4.1/2.4.2 mod_proxy_http.c information disclosure
7254| [61507] Apache POI up to 3.8 UnhandledDataStructure denial of service
7255| [6070] Apache Struts up to 2.3.4 Token Name Configuration Parameter privilege escalation
7256| [6069] Apache Struts up to 2.3.4 Request Parameter OGNL Expression denial of service
7257| [5764] Oracle Solaris 10 Apache HTTP Server information disclosure
7258| [5700] Oracle Secure Backup 10.3.0.3/10.4.0.1 Apache denial of service
7259| [61255] Apache Hadoop 2.0.0 Kerberos unknown vulnerability
7260| [61229] Apache Sling up to 2.1.1 denial of service
7261| [61152] Apache Commons-compress 1.0/1.1/1.2/1.3/1.4 denial of service
7262| [61094] Apache Roller up to 5.0 cross site scripting
7263| [61093] Apache Roller up to 5.0 cross site request forgery
7264| [61005] Apache OpenOffice 3.3/3.4 unknown vulnerability
7265| [9673] Apache HTTP Server up to 2.4.4 mod_dav mod_dav.c Request denial of service
7266| [5436] Apache OpenOffice 3.3/3.4 WPXContentListener.cpp _closeTableRow File memory corruption
7267| [5435] Apache OpenOffice 3.3/3.4 vclmi.dll File memory corruption
7268| [60730] PHP 5.4.0/5.4.1/5.4.2 apache_request_headers memory corruption
7269| [60708] Apache Qpid 0.12 unknown vulnerability
7270| [5032] Apache Hadoop up to 0.20.205.0/1.0.1/0.23.1 Kerberos/MapReduce Security Feature privilege escalation
7271| [4949] Apache Struts File Upload XSLTResult.java XSLT File privilege escalation
7272| [4955] Apache Traffic Server 3.0.3/3.1.2 HTTP Header Parser memory corruption
7273| [4882] Apache Wicket up to 1.5.4 directory traversal
7274| [4881] Apache Wicket up to 1.4.19 cross site scripting
7275| [4884] Apache HTTP Server up to 2.3.6 mod_fcgid fcgid_spawn_ctl.c FcgidMaxProcessesPerClass HTTP Requests denial of service
7276| [60352] Apache Struts up to 2.2.3 memory corruption
7277| [60153] Apache Portable Runtime up to 1.4.3 denial of service
7278| [4598] Apache Struts 1.3.10 upload-submit.do cross site scripting
7279| [4597] Apache Struts 1.3.10 processSimple.do cross site scripting
7280| [4596] Apache Struts 2.0.14/2.2.3 struts2-rest-showcase/orders cross site scripting
7281| [4595] Apache Struts 2.0.14/2.2.3 struts2-showcase/person/editPerson.action cross site scripting
7282| [4583] Apache HTTP Server up to 2.2.21 Threaded MPM denial of service
7283| [4582] Apache HTTP Server up to 2.2.21 protocol.c information disclosure
7284| [4571] Apache Struts up to 2.3.1.2 privilege escalation
7285| [4557] Apache Tomcat up to 7.0.21 Caching/Recycling information disclosure
7286| [59934] Apache Tomcat up to 6.0.9 DigestAuthenticator.java unknown vulnerability
7287| [59933] Apache Tomcat up to 6.0.9 Access Restriction unknown vulnerability
7288| [59932] Apache Tomcat up to 6.0.9 unknown vulnerability
7289| [59931] Apache Tomcat up to 6.0.9 Access Restriction information disclosure
7290| [59902] Apache Struts up to 2.2.3 Interfaces unknown vulnerability
7291| [4528] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
7292| [4527] Apache Struts up to 2.2.3 ExceptionDelegator cross site scripting
7293| [59888] Apache Tomcat up to 6.0.6 denial of service
7294| [59886] Apache ActiveMQ up to 5.5.1 Crash denial of service
7295| [4513] Apache Struts up to 2.3.1 ParameterInterceptor directory traversal
7296| [4512] Apache Struts up to 2.2.3 CookieInterceptor privilege escalation
7297| [59850] Apache Geronimo up to 2.2.1 denial of service
7298| [59825] Apache HTTP Server up to 2.1.7 mod_reqtimeout denial of service
7299| [59556] Apache HTTP Server up to 2.0.53 mod_proxy information disclosure
7300| [58467] Apache libcloud 0.2.0/0.3.0/0.3.1/0.4.0 Access Restriction spoofing
7301| [58413] Apache Tomcat up to 6.0.10 spoofing
7302| [58381] Apache Wicket up to 1.4.17 cross site scripting
7303| [58296] Apache Tomcat up to 7.0.19 unknown vulnerability
7304| [57888] Apache HttpClient 4.0/4.0.1/4.1 Authorization information disclosure
7305| [57587] Apache Subversion up to 1.6.16 mod_dav_svn information disclosure
7306| [57585] Apache Subversion up to 1.6.16 mod_dav_svn Memory Consumption denial of service
7307| [57584] Apache Subversion up to 1.6.4 mod_dav_svn NULL Pointer Dereference denial of service
7308| [57577] Apache Rampart-C 1.3.0 Access Restriction rampart_timestamp_token_validate privilege escalation
7309| [57568] Apache Archiva up to 1.3.4 cross site scripting
7310| [57567] Apache Archiva up to 1.3.4 cross site request forgery
7311| [57481] Apache Tomcat 7.0.12/7.0.13 Access Restriction unknown vulnerability
7312| [4355] Apache HTTP Server APR apr_fnmatch denial of service
7313| [57435] Apache Struts up to 2.2.1.1 FileHandler.java cross site scripting
7314| [57425] Apache Struts up to 2.2.1.1 cross site scripting
7315| [4352] Apache HTTP Server 2.2.x APR apr_fnmatch denial of service
7316| [57025] Apache Tomcat up to 7.0.11 information disclosure
7317| [57024] Apache Tomcat 7.0.11 Access Restriction information disclosure
7318| [56774] IBM WebSphere Application Server up to 7.0.0.14 org.apache.jasper.runtime.JspWriterImpl.response denial of service
7319| [56824] Apache Subversion up to 1.6.4 mod_dav_svn NULL Pointer Dereference denial of service
7320| [56832] Apache Tomcat up to 7.0.10 Access Restriction information disclosure
7321| [56830] Apache Tomcat up to 7.0.9 Access Restriction privilege escalation
7322| [12440] Apache Tomcat 6.0.33 Malicious Request cross site scripting
7323| [56512] Apache Continuum up to 1.4.0 cross site scripting
7324| [4285] Apache Tomcat 5.x JVM getLocale denial of service
7325| [4284] Apache Tomcat 5.x HTML Manager Infinite Loop cross site scripting
7326| [4283] Apache Tomcat 5.x ServletContect privilege escalation
7327| [56441] Apache Tomcat up to 7.0.6 denial of service
7328| [56300] Apache CouchDB up to 1.0.1 Web Administration Interface cross site scripting
7329| [55967] Apache Subversion up to 1.6.4 rev_hunt.c denial of service
7330| [55966] Apache Subversion up to 1.6.4 mod_dav_svn repos.c walk denial of service
7331| [55095] Apache Axis2 up to 1.6 Default Password memory corruption
7332| [55631] Apache Archiva up to 1.3.1 User Account cross site request forgery
7333| [55556] Apache Tomcat up to 6.0.29 Default Configuration information disclosure
7334| [55553] Apache Tomcat up to 7.0.4 sessionsList.jsp cross site scripting
7335| [55162] Apache MyFaces up to 2.0.0 Authentication Code unknown vulnerability
7336| [54881] Apache Subversion up to 1.6.12 mod_dav_svn authz.c privilege escalation
7337| [54879] Apache APR-util up to 0.9.14 mod_reqtimeout apr_brigade_split_line denial of service
7338| [54693] Apache Traffic Server DNS Cache unknown vulnerability
7339| [54416] Apache CouchDB up to 0.11.0 cross site request forgery
7340| [54394] Apache CXF up to 2.2.8 Memory Consumption denial of service
7341| [54261] Apache Tomcat jsp/cal/cal2.jsp cross site scripting
7342| [54166] Apache HTTP Server up to 2.2.12 mod_cache Crash denial of service
7343| [54385] Apache Struts up to 2.1.8.1 ParameterInterceptor unknown vulnerability
7344| [54012] Apache Tomcat up to 6.0.10 denial of service
7345| [53763] Apache Axis2 1.3/1.4/1.4.1/1.5/1.5.1 Memory Consumption denial of service
7346| [53368] Apache MyFaces 1.1.7/1.2.8 cross site scripting
7347| [53397] Apache axis2 1.4.1/1.5.1 Administration Console cross site scripting
7348| [52894] Apache Tomcat up to 6.0.7 information disclosure
7349| [52960] Apache ActiveMQ up to 5.4-snapshot information disclosure
7350| [52843] Apache HTTP Server mod_auth_shadow unknown vulnerability
7351| [52786] Apache Open For Business Project up to 09.04 cross site scripting
7352| [52587] Apache ActiveMQ up to 5.3.0 cross site request forgery
7353| [52586] Apache ActiveMQ up to 5.3.0 cross site scripting
7354| [52584] Apache CouchDB up to 0.10.1 information disclosure
7355| [51757] Apache HTTP Server 2.0.44 cross site scripting
7356| [51756] Apache HTTP Server 2.0.44 spoofing
7357| [51717] Apache HTTP Server up to 1.3.3 mod_proxy ap_proxy_send_fb memory corruption
7358| [51690] Apache Tomcat up to 6.0 directory traversal
7359| [51689] Apache Tomcat up to 6.0 information disclosure
7360| [51688] Apache Tomcat up to 6.0 directory traversal
7361| [50886] HP Operations Manager 8.10 on Windows File Upload org.apache.catalina.manager.HTMLManagerServlet memory corruption
7362| [50802] Apache Tomcat up to 3.3 Default Password weak authentication
7363| [50626] Apache Solr 1.0.0 cross site scripting
7364| [49857] Apache HTTP Server mod_proxy_ftp cross site scripting
7365| [49856] Apache HTTP Server 2.2.13 mod_proxy_ftp ap_proxy_ftp_handler denial of service
7366| [49348] Apache Xerces-C++ 2.7.0 Stack-Based denial of service
7367| [86789] Apache Portable Runtime memory/unix/apr_pools.c unknown vulnerability
7368| [49283] Apache APR-util up to 1.3.8 apr-util misc/apr_rmm.c apr_rmm_realloc memory corruption
7369| [48952] Apache HTTP Server up to 1.3.6 mod_deflate denial of service
7370| [48626] Apache Tomcat up to 4.1.23 Access Restriction directory traversal
7371| [48431] Apache Tomcat up to 4.1.23 j_security_check cross site scripting
7372| [48430] Apache Tomcat up to 4.1.23 mod_jk denial of service
7373| [47801] Apache Geronimo 2.1/2.1.1/2.1.2/2.1.3 Administration Console cross site request forgery
7374| [47800] Apache Geronimo 2.1/2.1.1/2.1.2/2.1.3 Administration Console cross site scripting
7375| [47799] Apache Geronimo 2.1/2.1.1/2.1.2/2.1.3 Administration Console directory traversal
7376| [47648] Apache Tiles 2.1.0/2.1.1 cross site scripting
7377| [47640] Apache Struts 2.0.6/2.0.8/2.0.9/2.0.11/2.1 cross site scripting
7378| [47638] Apache Tomcat up to 4.1.23 mod_jk information disclosure
7379| [47636] Apache Struts 2.0.9 xip_client.html cross site scripting
7380| [47593] Apache Mod Perl 1 perl-status Apache::Status cross site scripting
7381| [47637] Apache Struts 1.0.2/1.1/1.2.4/1.2.7/1.2.8 cross site scripting
7382| [47239] Apache Struts up to 2.1.2 Beta struts directory traversal
7383| [47214] Apachefriends xampp 1.6.8 spoofing
7384| [47213] Apachefriends xampp 1.6.8 htaccess cross site request forgery
7385| [47162] Apachefriends XAMPP 1.4.4 weak authentication
7386| [47065] Apache Tomcat 4.1.23 cross site scripting
7387| [46834] Apache Tomcat up to 5.5.20 cross site scripting
7388| [46004] Apache Jackrabbit 1.4/1.5.0 search.jsp cross site scripting
7389| [49205] Apache Roller 2.3/3.0/3.1/4.0 Search cross site scripting
7390| [86625] Apache Struts directory traversal
7391| [44461] Apache Tomcat up to 5.5.0 information disclosure
7392| [44389] Apache Xerces-C++ XML Parser Memory Consumption denial of service
7393| [44352] Apache Friends XAMPP 1.6.8 adodb.php cross site scripting
7394| [43663] Apache Tomcat up to 6.0.16 directory traversal
7395| [43612] Apache Friends XAMPP 1.6.7 iart.php cross site scripting
7396| [43556] Apache HTTP Server up to 2.1.8 mod_proxy_ftp proxy_ftp.c cross site scripting
7397| [43516] Apache Tomcat up to 4.1.20 directory traversal
7398| [43509] Apache Tomcat up to 6.0.13 cross site scripting
7399| [42637] Apache Tomcat up to 6.0.16 cross site scripting
7400| [42325] Apache HTTP Server up to 2.1.8 Error Page cross site scripting
7401| [41838] Apache-SSL 1.3.34 1.57 expandcert privilege escalation
7402| [41091] Apache Software Foundation Mod Jk up to 2.0.1 mod_jk2 Stack-based memory corruption
7403| [40924] Apache Tomcat up to 6.0.15 information disclosure
7404| [40923] Apache Tomcat up to 6.0.15 unknown vulnerability
7405| [40922] Apache Tomcat up to 6.0 information disclosure
7406| [40710] Apache HTTP Server up to 2.0.61 mod_negotiation cross site scripting
7407| [40709] Apache HTTP Server up to 2.0.53 mod_negotiation cross site scripting
7408| [40656] Apache Tomcat 5.5.20 information disclosure
7409| [40503] Apache HTTP Server mod_proxy_ftp cross site scripting
7410| [40502] Apache HTTP Server up to 2.2.5 mod_proxy_balancer memory corruption
7411| [40501] Apache HTTP Server 2.2.6 mod_proxy_balancer cross site request forgery
7412| [40398] Apache HTTP Server up to 2.2 mod_proxy_balancer cross site scripting
7413| [40397] Apache HTTP Server up to 2.2 mod_proxy_balancer balancer_handler denial of service
7414| [40234] Apache Tomcat up to 6.0.15 directory traversal
7415| [40221] Apache HTTP Server 2.2.6 information disclosure
7416| [40027] David Castro Apache Authcas 0.4 sql injection
7417| [3495] Apache OpenOffice up to 2.3 Database Document Processor unknown vulnerability
7418| [3489] Apache HTTP Server 2.x HTTP Header cross site scripting
7419| [3414] Apache Tomcat WebDAV Stored privilege escalation
7420| [39489] Apache Jakarta Slide up to 2.1 directory traversal
7421| [39540] Apache Geronimo 2.0/2.0.1/2.0.2/2.1 unknown vulnerability
7422| [3310] Apache OpenOffice 1.1.3/2.0.4/2.2.1 TIFF Image Parser Heap-based memory corruption
7423| [38768] Apache HTTP Server up to 2.1.7 mod_autoindex.c cross site scripting
7424| [38952] Apache Geronimo 2.0.1/2.1 unknown vulnerability
7425| [38658] Apache Tomcat 4.1.31 cal2.jsp cross site request forgery
7426| [38524] Apache Geronimo 2.0 unknown vulnerability
7427| [3256] Apache Tomcat up to 6.0.13 cross site scripting
7428| [38331] Apache Tomcat 4.1.24 information disclosure
7429| [38330] Apache Tomcat 4.1.24 information disclosure
7430| [38185] Apache Tomcat 3.3/3.3.1/3.3.1a/3.3.2 Error Message CookieExample cross site scripting
7431| [37967] Apache Tomcat up to 4.1.36 Error Message sendmail.jsp cross site scripting
7432| [37647] Apache Derby 10.1.1.0/10.1.2.1/10.1.3.1 Authorization unknown vulnerability
7433| [37646] Apache Derby 10.1.1.0/10.1.2.1/10.1.3.1 unknown vulnerability
7434| [3141] Apache Tomcat up to 4.1.31 Accept-Language Header cross site scripting
7435| [3133] Apache Tomcat up to 6.0 HTTP cross site scripting
7436| [37292] Apache Tomcat up to 5.5.1 cross site scripting
7437| [3130] Apache OpenOffice 2.2.1 RTF Document Heap-based memory corruption
7438| [36981] Apache Tomcat JK Web Server Connector up to 1.2.22 mod_jk directory traversal
7439| [36892] Apache Tomcat up to 4.0.0 hello.jsp cross site scripting
7440| [37320] Apache MyFaces Tomahawk up to 1.1.4 cross site scripting
7441| [36697] Apache Tomcat up to 5.5.17 implicit-objects.jsp cross site scripting
7442| [36491] Apache Axis 1.0 Installation javaioFileNotFoundException information disclosure
7443| [36400] Apache Tomcat 5.5.15 mod_jk cross site scripting
7444| [36698] Apache Tomcat up to 4.0.0 cal2.jsp cross site scripting
7445| [36224] XAMPP Apache Distribution up to 1.6.0a adodb.php connect memory corruption
7446| [36225] XAMPP Apache Distribution 1.6.0a sql injection
7447| [2997] Apache httpd/Tomcat 5.5/6.0 directory traversal
7448| [35896] Apache Apache Test up to 1.29 mod_perl denial of service
7449| [35653] Avaya S8300 Cm 3.1.2 Apache Tomcat unknown vulnerability
7450| [35402] Apache Tomcat JK Web Server Connector 1.2.19 mod_jk.so map_uri_to_worker memory corruption
7451| [35067] Apache Stats up to 0.0.2 extract unknown vulnerability
7452| [35025] Apache Stats up to 0.0.3 extract unknown vulnerability
7453| [34252] Apache HTTP Server denial of service
7454| [2795] Apache OpenOffice 2.0.4 WMF/EMF File Heap-based memory corruption
7455| [33877] Apache Opentaps 0.9.3 cross site scripting
7456| [33876] Apache Open For Business Project unknown vulnerability
7457| [33875] Apache Open For Business Project cross site scripting
7458| [2703] Apache Jakarta Tomcat up to 5.x der_get_oid memory corruption
7459| [2611] Apache HTTP Server up to 1.0.1 set_var Format String
7460|
7461| MITRE CVE - https://cve.mitre.org:
7462| [CVE-2013-4156] Apache OpenOffice.org (OOo) before 4.0 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted element in an OOXML document file.
7463| [CVE-2013-4131] The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
7464| [CVE-2013-3239] phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrated by a .php.sql filename.
7465| [CVE-2013-3060] The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests.
7466| [CVE-2013-2765] The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
7467| [CVE-2013-2251] Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
7468| [CVE-2013-2249] mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
7469| [CVE-2013-2248] Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix.
7470| [CVE-2013-2189] Apache OpenOffice.org (OOo) before 4.0 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via invalid PLCF data in a DOC document file.
7471| [CVE-2013-2135] Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
7472| [CVE-2013-2134] Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135.
7473| [CVE-2013-2115] Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966.
7474| [CVE-2013-2071] java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.
7475| [CVE-2013-2067] java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.
7476| [CVE-2013-1966] Apache Struts 2 before 2.3.14.1 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
7477| [CVE-2013-1965] Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.1, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
7478| [CVE-2013-1896] mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
7479| [CVE-2013-1884] The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.
7480| [CVE-2013-1879] Cross-site scripting (XSS) vulnerability in scheduled.jsp in Apache ActiveMQ 5.8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving the "cron of a message."
7481| [CVE-2013-1862] mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
7482| [CVE-2013-1849] The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
7483| [CVE-2013-1847] The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
7484| [CVE-2013-1846] The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
7485| [CVE-2013-1845] The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
7486| [CVE-2013-1814] The users/get program in the User RPC API in Apache Rave 0.11 through 0.20 allows remote authenticated users to obtain sensitive information about all user accounts via the offset parameter, as demonstrated by discovering password hashes in the password field of a response.
7487| [CVE-2013-1777] The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not property implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
7488| [CVE-2013-1768] The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
7489| [CVE-2013-1088] Cross-site request forgery (CSRF) vulnerability in Novell iManager 2.7 before SP6 Patch 1 allows remote attackers to hijack the authentication of arbitrary users by leveraging improper request validation by iManager code deployed within an Apache Tomcat container.
7490| [CVE-2013-1048] The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
7491| [CVE-2013-0966] The Apple mod_hfs_apple module for the Apache HTTP Server in Apple Mac OS X before 10.8.3 does not properly handle ignorable Unicode characters, which allows remote attackers to bypass intended directory authentication requirements via a crafted pathname in a URI.
7492| [CVE-2013-0942] Cross-site scripting (XSS) vulnerability in EMC RSA Authentication Agent 7.1 before 7.1.1 for Web for Internet Information Services, and 7.1 before 7.1.1 for Web for Apache, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
7493| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
7494| [CVE-2013-0253] The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificate checks, which allows remote attackers to spoof servers via a man-in-the-middle (MITM) attack.
7495| [CVE-2013-0248] The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.
7496| [CVE-2013-0239] Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element.
7497| [CVE-2012-6573] Cross-site scripting (XSS) vulnerability in the Apache Solr Autocomplete module 6.x-1.x before 6.x-1.4 and 7.x-1.x before 7.x-1.3 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving autocomplete results.
7498| [CVE-2012-6551] The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests.
7499| [CVE-2012-6092] Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551.
7500| [CVE-2012-5887] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
7501| [CVE-2012-5886] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
7502| [CVE-2012-5885] The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
7503| [CVE-2012-5786] The wsdl_first_https sample code in distribution/src/main/release/samples/wsdl_first_https/src/main/ in Apache CXF, possibly 2.6.0, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
7504| [CVE-2012-5785] Apache Axis2/Java 1.6.2 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
7505| [CVE-2012-5784] Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
7506| [CVE-2012-5783] Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
7507| [CVE-2012-5633] The URIMappingInterceptor in Apache CXF before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request.
7508| [CVE-2012-5616] Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API.
7509| [CVE-2012-5568] Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.
7510| [CVE-2012-5351] Apache Axis2 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack," a different vulnerability than CVE-2012-4418.
7511| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
7512| [CVE-2012-4557] The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
7513| [CVE-2012-4556] The token processing system (pki-tps) in Red Hat Certificate System (RHCS) before 8.1.3 allows remote attackers to cause a denial of service (Apache httpd web server child process restart) via certain unspecified empty search fields in a user certificate search query.
7514| [CVE-2012-4555] The token processing system (pki-tps) in Red Hat Certificate System (RHCS) before 8.1.3 does not properly handle interruptions of token format operations, which allows remote attackers to cause a denial of service (NULL pointer dereference and Apache httpd web server child process crash) via unspecified vectors.
7515| [CVE-2012-4534] org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response.
7516| [CVE-2012-4528] The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
7517| [CVE-2012-4501] Citrix Cloud.com CloudStack, and Apache CloudStack pre-release, allows remote attackers to make arbitrary API calls by leveraging the system user account, as demonstrated by API calls to delete VMs.
7518| [CVE-2012-4460] The serializing/deserializing functions in the qpid::framing::Buffer class in Apache Qpid 0.20 and earlier allow remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors. NOTE: this issue could also trigger an out-of-bounds read, but it might not trigger a crash.
7519| [CVE-2012-4459] Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read.
7520| [CVE-2012-4458] The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.
7521| [CVE-2012-4446] The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
7522| [CVE-2012-4431] org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.
7523| [CVE-2012-4418] Apache Axis2 allows remote attackers to forge messages and bypass authentication via an "XML Signature wrapping attack."
7524| [CVE-2012-4387] Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression.
7525| [CVE-2012-4386] The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.
7526| [CVE-2012-4360] Cross-site scripting (XSS) vulnerability in the mod_pagespeed module 0.10.19.1 through 0.10.22.4 for the Apache HTTP Server allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
7527| [CVE-2012-4063] The Apache Santuario configuration in Eucalyptus before 3.1.1 does not properly restrict applying XML Signature transforms to documents, which allows remote attackers to cause a denial of service via unspecified vectors.
7528| [CVE-2012-4001] The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server does not properly verify its host name, which allows remote attackers to trigger HTTP requests to arbitrary hosts via unspecified vectors, as demonstrated by requests to intranet servers.
7529| [CVE-2012-3908] Multiple cross-site request forgery (CSRF) vulnerabilities in the ISE Administrator user interface (aka the Apache Tomcat interface) on Cisco Identity Services Engine (ISE) 3300 series appliances before 1.1.0.665 Cumulative Patch 1 allow remote attackers to hijack the authentication of administrators, aka Bug ID CSCty46684.
7530| [CVE-2012-3546] org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.
7531| [CVE-2012-3544] Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
7532| [CVE-2012-3526] The reverse proxy add forward module (mod_rpaf) 0.5 and 0.6 for the Apache HTTP Server allows remote attackers to cause a denial of service (server or application crash) via multiple X-Forwarded-For headers in a request.
7533| [CVE-2012-3513] munin-cgi-graph in Munin before 2.0.6, when running as a CGI module under Apache, allows remote attackers to load new configurations and create files in arbitrary directories via the logdir command.
7534| [CVE-2012-3506] Unspecified vulnerability in the Apache Open For Business Project (aka OFBiz) 10.04.x before 10.04.03 has unknown impact and attack vectors.
7535| [CVE-2012-3502] The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
7536| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
7537| [CVE-2012-3467] Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
7538| [CVE-2012-3451] Apache CXF before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to execute unintended web-service operations by sending a header with a SOAP Action String that is inconsistent with the message body.
7539| [CVE-2012-3446] Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
7540| [CVE-2012-3376] DataNodes in Apache Hadoop 2.0.0 alpha does not check the BlockTokens of clients when Kerberos is enabled and the DataNode has checked out the same BlockPool twice from a NodeName, which might allow remote clients to read arbitrary blocks, write to blocks to which they only have read access, and have other unspecified impacts.
7541| [CVE-2012-3373] Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.21 and 1.5.x before 1.5.8 allows remote attackers to inject arbitrary web script or HTML via vectors involving a %00 sequence in an Ajax link URL associated with a Wicket app.
7542| [CVE-2012-3126] Unspecified vulnerability in the Solaris Cluster component in Oracle Sun Products Suite 3.3 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Apache Tomcat Agent.
7543| [CVE-2012-3123] Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality, related to Apache HTTP Server.
7544| [CVE-2012-2760] mod_auth_openid before 0.7 for Apache uses world-readable permissions for /tmp/mod_auth_openid.db, which allows local users to obtain session ids.
7545| [CVE-2012-2733] java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data.
7546| [CVE-2012-2687] Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
7547| [CVE-2012-2381] Multiple cross-site scripting (XSS) vulnerabilities in Apache Roller before 5.0.1 allow remote authenticated users to inject arbitrary web script or HTML by leveraging the blogger role.
7548| [CVE-2012-2380] Multiple cross-site request forgery (CSRF) vulnerabilities in the admin/editor console in Apache Roller before 5.0.1 allow remote attackers to hijack the authentication of admins or editors by leveraging the HTTP POST functionality.
7549| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
7550| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
7551| [CVE-2012-2329] Buffer overflow in the apache_request_headers function in sapi/cgi/cgi_main.c in PHP 5.4.x before 5.4.3 allows remote attackers to cause a denial of service (application crash) via a long string in the header of an HTTP request.
7552| [CVE-2012-2145] Apache Qpid 0.17 and earlier does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.
7553| [CVE-2012-2138] The @CopyFrom operation in the POST servlet in the org.apache.sling.servlets.post bundle before 2.1.2 in Apache Sling does not prevent attempts to copy an ancestor node to a descendant node, which allows remote attackers to cause a denial of service (infinite loop) via a crafted HTTP request.
7554| [CVE-2012-2098] Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress before 1.4.1 allows remote attackers to cause a denial of service (CPU consumption) via a file with many repeating inputs.
7555| [CVE-2012-1574] The Kerberos/MapReduce security functionality in Apache Hadoop 0.20.203.0 through 0.20.205.0, 0.23.x before 0.23.2, and 1.0.x before 1.0.2, as used in Cloudera CDH CDH3u0 through CDH3u2, Cloudera hadoop-0.20-sbin before 0.20.2+923.197, and other products, allows remote authenticated users to impersonate arbitrary cluster user accounts via unspecified vectors.
7556| [CVE-2012-1181] fcgid_spawn_ctl.c in the mod_fcgid module 2.3.6 for the Apache HTTP Server does not recognize the FcgidMaxProcessesPerClass directive for a virtual host, which makes it easier for remote attackers to cause a denial of service (memory consumption) via a series of HTTP requests that triggers a process count higher than the intended limit.
7557| [CVE-2012-1089] Directory traversal vulnerability in Apache Wicket 1.4.x before 1.4.20 and 1.5.x before 1.5.5 allows remote attackers to read arbitrary web-application files via a relative pathname in a URL for a Wicket resource that corresponds to a null package.
7558| [CVE-2012-1007] Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do.
7559| [CVE-2012-1006] Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders.
7560| [CVE-2012-0883] envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
7561| [CVE-2012-0840] tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
7562| [CVE-2012-0838] Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
7563| [CVE-2012-0788] The PDORow implementation in PHP before 5.3.9 does not properly interact with the session feature, which allows remote attackers to cause a denial of service (application crash) via a crafted application that uses a PDO driver for a fetch and then calls the session_start function, as demonstrated by a crash of the Apache HTTP Server.
7564| [CVE-2012-0394] ** DISPUTED ** The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself."
7565| [CVE-2012-0393] The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object.
7566| [CVE-2012-0392] The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.
7567| [CVE-2012-0391] The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
7568| [CVE-2012-0256] Apache Traffic Server 2.0.x and 3.0.x before 3.0.4 and 3.1.x before 3.1.3 does not properly allocate heap memory, which allows remote attackers to cause a denial of service (daemon crash) via a long HTTP Host header.
7569| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
7570| [CVE-2012-0213] The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
7571| [CVE-2012-0053] protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
7572| [CVE-2012-0047] Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the wicket:pageMapName parameter.
7573| [CVE-2012-0031] scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
7574| [CVE-2012-0022] Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.
7575| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
7576| [CVE-2011-5064] DigestAuthenticator.java in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server secret (aka private key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging knowledge of this string, a different vulnerability than CVE-2011-1184.
7577| [CVE-2011-5063] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or authorization requirements, a different vulnerability than CVE-2011-1184.
7578| [CVE-2011-5062] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184.
7579| [CVE-2011-5057] Apache Struts 2.3.1.1 and earlier provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
7580| [CVE-2011-5034] Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
7581| [CVE-2011-4905] Apache ActiveMQ before 5.6.0 allows remote attackers to cause a denial of service (file-descriptor exhaustion and broker crash or hang) by sending many openwire failover:tcp:// connection requests.
7582| [CVE-2011-4858] Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
7583| [CVE-2011-4668] IBM Tivoli Netcool/Reporter 2.2 before 2.2.0.8 allows remote attackers to execute arbitrary code via vectors related to an unspecified CGI program used with the Apache HTTP Server.
7584| [CVE-2011-4449] actions/files/files.php in WikkaWiki 1.3.1 and 1.3.2, when INTRANET_MODE is enabled, supports file uploads for file extensions that are typically absent from an Apache HTTP Server TypesConfig file, which makes it easier for remote attackers to execute arbitrary PHP code by placing this code in a file whose name has multiple extensions, as demonstrated by a (1) .mm or (2) .vpp file.
7585| [CVE-2011-4415] The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.
7586| [CVE-2011-4317] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
7587| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
7588| [CVE-2011-3620] Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote attackers to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.
7589| [CVE-2011-3607] Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
7590| [CVE-2011-3376] org/apache/catalina/core/DefaultInstanceManager.java in Apache Tomcat 7.x before 7.0.22 does not properly restrict ContainerServlets in the Manager application, which allows local users to gain privileges by using an untrusted web application to access the Manager application's functionality.
7591| [CVE-2011-3375] Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.
7592| [CVE-2011-3368] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
7593| [CVE-2011-3348] The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
7594| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
7595| [CVE-2011-3190] Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
7596| [CVE-2011-2729] native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.
7597| [CVE-2011-2712] Cross-site scripting (XSS) vulnerability in Apache Wicket 1.4.x before 1.4.18, when setAutomaticMultiWindowSupport is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
7598| [CVE-2011-2688] SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field.
7599| [CVE-2011-2526] Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
7600| [CVE-2011-2516] Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
7601| [CVE-2011-2481] Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application. NOTE: this vulnerability exists because of a CVE-2009-0783 regression.
7602| [CVE-2011-2329] The rampart_timestamp_token_validate function in util/rampart_timestamp_token.c in Apache Rampart/C 1.3.0 does not properly calculate the expiration of timestamp tokens, which allows remote attackers to bypass intended access restrictions by leveraging an expired token, a different vulnerability than CVE-2011-0730.
7603| [CVE-2011-2204] Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
7604| [CVE-2011-2088] XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
7605| [CVE-2011-2087] Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java.
7606| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
7607| [CVE-2011-1921] The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.
7608| [CVE-2011-1783] The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
7609| [CVE-2011-1772] Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element.
7610| [CVE-2011-1752] The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.
7611| [CVE-2011-1610] Multiple SQL injection vulnerabilities in xmldirectorylist.jsp in the embedded Apache HTTP Server component in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6.x before 6.1(5)su3, 7.x before 7.1(5)su4, 8.0 before 8.0(3a)su2, and 8.5 before 8.5(1)su1 allow remote attackers to execute arbitrary SQL commands via the (1) f, (2) l, or (3) n parameter, aka Bug ID CSCtj42064.
7612| [CVE-2011-1582] Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088, CVE-2011-1183, and CVE-2011-1419.
7613| [CVE-2011-1571] Unspecified vulnerability in the XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote attackers to execute arbitrary commands via unknown vectors.
7614| [CVE-2011-1570] Cross-site scripting (XSS) vulnerability in Liferay Portal Community Edition (CE) 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote authenticated users to inject arbitrary web script or HTML via a message title, a different vulnerability than CVE-2004-2030.
7615| [CVE-2011-1503] The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
7616| [CVE-2011-1502] Liferay Portal Community Edition (CE) 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote authenticated users to read arbitrary files via an entity declaration in conjunction with an entity reference, related to an XML External Entity (aka XXE) issue.
7617| [CVE-2011-1498] Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used with an authenticating proxy server, sends the Proxy-Authorization header to the origin server, which allows remote web servers to obtain sensitive information by logging this header.
7618| [CVE-2011-1475] The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users."
7619| [CVE-2011-1419] Apache Tomcat 7.x before 7.0.11, when web.xml has no security constraints, does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088.
7620| [CVE-2011-1318] Memory leak in org.apache.jasper.runtime.JspWriterImpl.response in the JavaServer Pages (JSP) component in IBM WebSphere Application Server (WAS) before 7.0.0.15 allows remote attackers to cause a denial of service (memory consumption) by accessing a JSP page of an application that is repeatedly stopped and restarted.
7621| [CVE-2011-1184] The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, related to lack of checking of nonce (aka server nonce) and nc (aka nonce-count or client nonce count) values.
7622| [CVE-2011-1183] Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011-1419.
7623| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
7624| [CVE-2011-1088] Apache Tomcat 7.x before 7.0.10 does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application.
7625| [CVE-2011-1077] Multiple cross-site scripting (XSS) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
7626| [CVE-2011-1026] Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators.
7627| [CVE-2011-0715] The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
7628| [CVE-2011-0534] Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.
7629| [CVE-2011-0533] Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta
7630| [CVE-2011-0419] Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
7631| [CVE-2011-0013] Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
7632| [CVE-2010-4644] Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.
7633| [CVE-2010-4539] The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
7634| [CVE-2010-4476] The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
7635| [CVE-2010-4455] Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 11.1.1.2 and 11.1.1.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Apache Plugin.
7636| [CVE-2010-4408] Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449.
7637| [CVE-2010-4312] The default configuration of Apache Tomcat 6.x does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to hijack a session via script access to a cookie.
7638| [CVE-2010-4172] Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.
7639| [CVE-2010-3872] The fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.6 for the Apache HTTP Server does not use bytewise pointer arithmetic in certain circumstances, which has unspecified impact and attack vectors related to "untrusted FastCGI applications" and a "stack buffer overwrite."
7640| [CVE-2010-3863] Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
7641| [CVE-2010-3854] Multiple cross-site scripting (XSS) vulnerabilities in the web administration interface (aka Futon) in Apache CouchDB 0.8.0 through 1.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
7642| [CVE-2010-3718] Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
7643| [CVE-2010-3449] Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1
7644| [CVE-2010-3315] authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
7645| [CVE-2010-3083] sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handshake.
7646| [CVE-2010-2952] Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.
7647| [CVE-2010-2791] mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
7648| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
7649| [CVE-2010-2234] Cross-site request forgery (CSRF) vulnerability in Apache CouchDB 0.8.0 through 0.11.0 allows remote attackers to hijack the authentication of administrators for direct requests to an installation URL.
7650| [CVE-2010-2227] Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
7651| [CVE-2010-2103] Cross-site scripting (XSS) vulnerability in axis2-admin/axis2-admin/engagingglobally in the administration console in Apache Axis2/Java 1.4.1, 1.5.1, and possibly other versions, as used in SAP Business Objects 12, 3com IMC, and possibly other products, allows remote attackers to inject arbitrary web script or HTML via the modules parameter. NOTE: some of these details are obtained from third party information.
7652| [CVE-2010-2086] Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
7653| [CVE-2010-2076] Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to samples/wsdl_first_pure_xml, a similar issue to CVE-2010-1632.
7654| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
7655| [CVE-2010-2057] shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack.
7656| [CVE-2010-1632] Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService.
7657| [CVE-2010-1623] Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
7658| [CVE-2010-1587] The Jetty ResourceHandler in Apache ActiveMQ 5.x before 5.3.2 and 5.4.x before 5.4.0 allows remote attackers to read JSP source code via a // (slash slash) initial substring in a URI for (1) admin/index.jsp, (2) admin/queues.jsp, or (3) admin/topics.jsp.
7659| [CVE-2010-1452] The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
7660| [CVE-2010-1325] Cross-site request forgery (CSRF) vulnerability in the apache2-slms package in SUSE Lifecycle Management Server (SLMS) 1.0 on SUSE Linux Enterprise (SLE) 11 allows remote attackers to hijack the authentication of unspecified victims via vectors related to improper parameter quoting. NOTE: some sources report that this is a vulnerability in a product named "Apache SLMS," but that is incorrect.
7661| [CVE-2010-1244] Cross-site request forgery (CSRF) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote attackers to hijack the authentication of unspecified victims for requests that create queues via the JMSDestination parameter in a queue action.
7662| [CVE-2010-1157] Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
7663| [CVE-2010-1151] Race condition in the mod_auth_shadow module for the Apache HTTP Server allows remote attackers to bypass authentication, and read and possibly modify data, via vectors related to improper interaction with an external helper application for validation of credentials.
7664| [CVE-2010-0684] Cross-site scripting (XSS) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote authenticated users to inject arbitrary web script or HTML via the JMSDestination parameter in a queue action.
7665| [CVE-2010-0434] The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
7666| [CVE-2010-0432] Multiple cross-site scripting (XSS) vulnerabilities in the Apache Open For Business Project (aka OFBiz) 09.04 and earlier, as used in Opentaps, Neogia, and Entente Oya, allow remote attackers to inject arbitrary web script or HTML via (1) the productStoreId parameter to control/exportProductListing, (2) the partyId parameter to partymgr/control/viewprofile (aka partymgr/control/login), (3) the start parameter to myportal/control/showPortalPage, (4) an invalid URI beginning with /facility/control/ReceiveReturn (aka /crmsfa/control/ReceiveReturn or /cms/control/ReceiveReturn), (5) the contentId parameter (aka the entityName variable) to ecommerce/control/ViewBlogArticle, (6) the entityName parameter to webtools/control/FindGeneric, or the (7) subject or (8) content parameter to an unspecified component under ecommerce/control/contactus.
7667| [CVE-2010-0425] modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
7668| [CVE-2010-0408] The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
7669| [CVE-2010-0390] Unrestricted file upload vulnerability in maxImageUpload/index.php in PHP F1 Max's Image Uploader 1.0, when Apache is not configured to handle the mime-type for files with pjpeg or jpeg extensions, allows remote attackers to execute arbitrary code by uploading a file with a pjpeg or jpeg extension, then accessing it via a direct request to the file in original/. NOTE: some of these details are obtained from third party information.
7670| [CVE-2010-0219] Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
7671| [CVE-2010-0010] Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow.
7672| [CVE-2010-0009] Apache CouchDB 0.8.0 through 0.10.1 allows remote attackers to obtain sensitive information by measuring the completion time of operations that verify (1) hashes or (2) passwords.
7673| [CVE-2009-5120] The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP port 1812 from arbitrary source IP addresses, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via UTF-7 text to the 404 error page of a Project Woodstock service on this port.
7674| [CVE-2009-5119] The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers in conf/server.xml, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
7675| [CVE-2009-5006] The SessionAdapter::ExchangeHandlerImpl::checkAlternate function in broker/SessionAdapter.cpp in the C++ Broker component in Apache Qpid before 0.6, as used in Red Hat Enterprise MRG before 1.3 and other products, allows remote authenticated users to cause a denial of service (NULL pointer dereference, daemon crash, and cluster outage) by attempting to modify the alternate of an exchange.
7676| [CVE-2009-5005] The Cluster::deliveredEvent function in cluster/Cluster.cpp in Apache Qpid, as used in Red Hat Enterprise MRG before 1.3 and other products, allows remote attackers to cause a denial of service (daemon crash and cluster outage) via invalid AMQP data.
7677| [CVE-2009-4355] Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
7678| [CVE-2009-4269] The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.
7679| [CVE-2009-3923] The VirtualBox 2.0.8 and 2.0.10 web service in Sun Virtual Desktop Infrastructure (VDI) 3.0 does not require authentication, which allows remote attackers to obtain unspecified access via vectors involving requests to an Apache HTTP Server.
7680| [CVE-2009-3890] Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.
7681| [CVE-2009-3843] HP Operations Manager 8.10 on Windows contains a "hidden account" in the XML file that specifies Tomcat users, which allows remote attackers to conduct unrestricted file upload attacks, and thereby execute arbitrary code, by using the org.apache.catalina.manager.HTMLManagerServlet class to make requests to manager/html/upload.
7682| [CVE-2009-3821] Cross-site scripting (XSS) vulnerability in the Apache Solr Search (solr) extension 1.0.0 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
7683| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
7684| [CVE-2009-3548] The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
7685| [CVE-2009-3250] The saveForwardAttachments procedure in the Compose Mail functionality in vtiger CRM 5.0.4 allows remote authenticated users to execute arbitrary code by composing an e-mail message with an attachment filename ending in (1) .php in installations based on certain Apache HTTP Server configurations, (2) .php. on Windows, or (3) .php/ on Linux, and then making a direct request to a certain pathname under storage/.
7686| [CVE-2009-3095] The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
7687| [CVE-2009-3094] The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
7688| [CVE-2009-2902] Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
7689| [CVE-2009-2901] The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
7690| [CVE-2009-2823] The Apache HTTP Server in Apple Mac OS X before 10.6.2 enables the HTTP TRACE method, which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified web client software.
7691| [CVE-2009-2699] The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
7692| [CVE-2009-2696] Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.
7693| [CVE-2009-2693] Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.
7694| [CVE-2009-2625] XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
7695| [CVE-2009-2412] Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR
7696| [CVE-2009-2299] The Artofdefence Hyperguard Web Application Firewall (WAF) module before 2.5.5-11635, 3.0 before 3.0.3-11636, and 3.1 before 3.1.1-11637, a module for the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via an HTTP request with a large Content-Length value but no POST data.
7697| [CVE-2009-1956] Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
7698| [CVE-2009-1955] The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
7699| [CVE-2009-1903] The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method.
7700| [CVE-2009-1891] The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
7701| [CVE-2009-1890] The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
7702| [CVE-2009-1885] Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
7703| [CVE-2009-1462] The Security Manager in razorCMS before 0.4 does not verify the permissions of every file owned by the apache user account, which is inconsistent with the documentation and allows local users to have an unspecified impact.
7704| [CVE-2009-1275] Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags.
7705| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
7706| [CVE-2009-1191] mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
7707| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
7708| [CVE-2009-0918] Multiple unspecified vulnerabilities in DFLabs PTK 1.0.0 through 1.0.4 allow remote attackers to execute arbitrary commands in processes launched by PTK's Apache HTTP Server via (1) "external tools" or (2) a crafted forensic image.
7709| [CVE-2009-0796] Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
7710| [CVE-2009-0783] Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
7711| [CVE-2009-0781] Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
7712| [CVE-2009-0754] PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server.
7713| [CVE-2009-0580] Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
7714| [CVE-2009-0486] Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.
7715| [CVE-2009-0039] Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown.
7716| [CVE-2009-0038] Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring
7717| [CVE-2009-0033] Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
7718| [CVE-2009-0026] Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the q parameter to (1) search.jsp or (2) swr.jsp.
7719| [CVE-2009-0023] The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
7720| [CVE-2008-6879] Cross-site scripting (XSS) vulnerability in Apache Roller 2.3, 3.0, 3.1, and 4.0 allows remote attackers to inject arbitrary web script or HTML via the q parameter in a search action.
7721| [CVE-2008-6755] ZoneMinder 1.23.3 on Fedora 10 sets the ownership of /etc/zm.conf to the apache user account, and sets the permissions to 0600, which makes it easier for remote attackers to modify this file by accessing it through a (1) PHP or (2) CGI script.
7722| [CVE-2008-6722] Novell Access Manager 3 SP4 does not properly expire X.509 certificate sessions, which allows physically proximate attackers to obtain a logged-in session by using a victim's web-browser process that continues to send the original and valid SSL sessionID, related to inability of Apache Tomcat to clear entries from its SSL cache.
7723| [CVE-2008-6682] Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) " (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag.
7724| [CVE-2008-6505] Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x.
7725| [CVE-2008-6504] ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
7726| [CVE-2008-5696] Novell NetWare 6.5 before Support Pack 8, when an OES2 Linux server is installed into the NDS tree, does not require a password for the ApacheAdmin console, which allows remote attackers to reconfigure the Apache HTTP Server via console operations.
7727| [CVE-2008-5676] Multiple unspecified vulnerabilities in the ModSecurity (aka mod_security) module 2.5.0 through 2.5.5 for the Apache HTTP Server, when SecCacheTransformations is enabled, allow remote attackers to cause a denial of service (daemon crash) or bypass the product's functionality via unknown vectors related to "transformation caching."
7728| [CVE-2008-5519] The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
7729| [CVE-2008-5518] Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet)
7730| [CVE-2008-5515] Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
7731| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
7732| [CVE-2008-4308] The doRead method in Apache Tomcat 4.1.32 through 4.1.34 and 5.5.10 through 5.5.20 does not return a -1 to indicate when a certain error condition has occurred, which can cause Tomcat to send POST content from one request to a different request.
7733| [CVE-2008-4008] Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
7734| [CVE-2008-3666] Unspecified vulnerability in Sun Solaris 10 and OpenSolaris before snv_96 allows (1) context-dependent attackers to cause a denial of service (panic) via vectors involving creation of a crafted file and use of the sendfilev system call, as demonstrated by a file served by an Apache 2.2.x web server with EnableSendFile configured
7735| [CVE-2008-3271] Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
7736| [CVE-2008-3257] Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
7737| [CVE-2008-2939] Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
7738| [CVE-2008-2938] Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
7739| [CVE-2008-2742] Unrestricted file upload in the mcpuk file editor (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) in Achievo 1.2.0 through 1.3.2 allows remote attackers to execute arbitrary code by uploading a file with .php followed by a safe extension, then accessing it via a direct request to the file in the Achievo root directory. NOTE: this is only a vulnerability in environments that support multiple extensions, such as Apache with the mod_mime module enabled.
7740| [CVE-2008-2717] TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, uses an insufficiently restrictive default fileDenyPattern for Apache, which allows remote attackers bypass security restrictions and upload configuration files such as .htaccess, or conduct file upload attacks using multiple extensions.
7741| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
7742| [CVE-2008-2384] SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
7743| [CVE-2008-2370] Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
7744| [CVE-2008-2364] The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
7745| [CVE-2008-2168] Cross-site scripting (XSS) vulnerability in Apache 2.2.6 and earlier allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded URLs that are not properly handled when displaying the 403 Forbidden error page.
7746| [CVE-2008-2025] Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters."
7747| [CVE-2008-1947] Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.
7748| [CVE-2008-1734] Interpretation conflict in PHP Toolkit before 1.0.1 on Gentoo Linux might allow local users to cause a denial of service (PHP outage) and read contents of PHP scripts by creating a file with a one-letter lowercase alphabetic name, which triggers interpretation of a certain unquoted [a-z] argument as a matching shell glob for this name, rather than interpretation as the literal [a-z] regular-expression string, and consequently blocks the launch of the PHP interpreter within the Apache HTTP Server.
7749| [CVE-2008-1678] Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.
7750| [CVE-2008-1232] Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
7751| [CVE-2008-0869] Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a "framework defined request parameter" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows.
7752| [CVE-2008-0732] The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.
7753| [CVE-2008-0555] The ExpandCert function in Apache-SSL before apache_1.3.41+ssl_1.59 does not properly handle (1) '/' and (2) '=' characters in a Distinguished Name (DN) in a client certificate, which might allow remote attackers to bypass authentication via a crafted DN that triggers overwriting of environment variables.
7754| [CVE-2008-0457] Unrestricted file upload vulnerability in the FileUpload class running on the Symantec LiveState Apache Tomcat server, as used by Symantec Backup Exec System Recovery Manager 7.0 and 7.0.1, allows remote attackers to upload and execute arbitrary JSP files via unknown vectors.
7755| [CVE-2008-0456] CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
7756| [CVE-2008-0455] Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
7757| [CVE-2008-0128] The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
7758| [CVE-2008-0005] mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
7759| [CVE-2008-0002] Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
7760| [CVE-2007-6750] The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
7761| [CVE-2007-6726] Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/.
7762| [CVE-2007-6514] Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.
7763| [CVE-2007-6423] ** DISPUTED ** Unspecified vulnerability in mod_proxy_balancer for Apache HTTP Server 2.2.x before 2.2.7-dev, when running on Windows, allows remote attackers to trigger memory corruption via a long URL. NOTE: the vendor could not reproduce this issue.
7764| [CVE-2007-6422] The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.
7765| [CVE-2007-6421] Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.
7766| [CVE-2007-6420] Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
7767| [CVE-2007-6388] Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
7768| [CVE-2007-6361] Gekko 0.8.2 and earlier stores sensitive information under the web root with possibly insufficient access control, which might allow remote attackers to read certain files under temp/, as demonstrated by a log file that records the titles of blog entries. NOTE: access to temp/ is blocked by .htaccess in most deployments that use Apache HTTP Server.
7769| [CVE-2007-6342] SQL injection vulnerability in the David Castro AuthCAS module (AuthCAS.pm) 0.4 for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the SESSION_COOKIE_NAME (session ID) in a cookie.
7770| [CVE-2007-6286] Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.
7771| [CVE-2007-6258] Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.
7772| [CVE-2007-6231] Multiple PHP remote file inclusion vulnerabilities in tellmatic 1.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the tm_includepath parameter to (1) Classes.inc.php, (2) statistic.inc.php, (3) status.inc.php, (4) status_top_x.inc.php, or (5) libchart-1.1/libchart.php in include/. NOTE: access to include/ is blocked by .htaccess in most deployments that use Apache HTTP Server.
7773| [CVE-2007-6203] Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
7774| [CVE-2007-5797] SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database.
7775| [CVE-2007-5731] Absolute path traversal vulnerability in Apache Jakarta Slide 2.1 and earlier allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag, a related issue to CVE-2007-5461.
7776| [CVE-2007-5461] Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
7777| [CVE-2007-5342] The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.
7778| [CVE-2007-5333] Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
7779| [CVE-2007-5156] Incomplete blacklist vulnerability in editor/filemanager/upload/php/upload.php in FCKeditor, as used in SiteX CMS 0.7.3.beta, La-Nai CMS, Syntax CMS, Cardinal Cms, and probably other products, allows remote attackers to upload and execute arbitrary PHP code via a file whose name contains ".php." and has an unknown extension, which is recognized as a .php file by the Apache HTTP server, a different vulnerability than CVE-2006-0658 and CVE-2006-2529.
7780| [CVE-2007-5085] Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain "access to Geronimo internals" via unspecified vectors.
7781| [CVE-2007-5000] Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
7782| [CVE-2007-4724] Cross-site request forgery (CSRF) vulnerability in cal2.jsp in the calendar examples application in Apache Tomcat 4.1.31 allows remote attackers to add events as arbitrary users via the time and description parameters.
7783| [CVE-2007-4723] Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
7784| [CVE-2007-4641] Directory traversal vulnerability in index.php in Pakupaku CMS 0.4 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter, as demonstrated by injecting code into an Apache log file.
7785| [CVE-2007-4556] Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
7786| [CVE-2007-4548] The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
7787| [CVE-2007-4465] Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
7788| [CVE-2007-3847] The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
7789| [CVE-2007-3571] The Apache Web Server as used in Novell NetWare 6.5 and GroupWise allows remote attackers to obtain sensitive information via a certain directive to Apache that causes the HTTP-Header response to be modified, which may reveal the server's internal IP address.
7790| [CVE-2007-3386] Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.
7791| [CVE-2007-3385] Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
7792| [CVE-2007-3384] Multiple cross-site scripting (XSS) vulnerabilities in examples/servlet/CookieExample in Apache Tomcat 3.3 through 3.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Name or (2) Value field, related to error messages.
7793| [CVE-2007-3383] Cross-site scripting (XSS) vulnerability in SendMailServlet in the examples web application (examples/jsp/mail/sendmail.jsp) in Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.36 allows remote attackers to inject arbitrary web script or HTML via the From field and possibly other fields, related to generation of error messages.
7794| [CVE-2007-3382] Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
7795| [CVE-2007-3304] Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
7796| [CVE-2007-3303] Apache httpd 2.0.59 and 2.2.4, with the Prefork MPM module, allows local users to cause a denial of service via certain code sequences executed in a worker process that (1) stop request processing by killing all worker processes and preventing creation of replacements or (2) hang the system by forcing the master process to fork an arbitrarily large number of worker processes. NOTE: This might be an inherent design limitation of Apache with respect to worker processes in hosted environments.
7797| [CVE-2007-3101] Multiple cross-site scripting (XSS) vulnerabilities in certain JSF applications in Apache MyFaces Tomahawk before 1.1.6 allow remote attackers to inject arbitrary web script via the autoscroll parameter, which is injected into Javascript that is sent to the client.
7798| [CVE-2007-2450] Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
7799| [CVE-2007-2449] Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the '
7800| [CVE-2007-2353] Apache Axis 1.0 allows remote attackers to obtain sensitive information by requesting a non-existent WSDL file, which reveals the installation path in the resulting exception message.
7801| [CVE-2007-2025] Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file.
7802| [CVE-2007-1863] cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
7803| [CVE-2007-1862] The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.
7804| [CVE-2007-1860] mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
7805| [CVE-2007-1858] The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
7806| [CVE-2007-1842] Directory traversal vulnerability in login.php in JSBoard before 2.0.12 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the table parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, a related issue to CVE-2006-2019.
7807| [CVE-2007-1801] Directory traversal vulnerability in inc/lang.php in sBLOG 0.7.3 Beta allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conf_lang_default parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by inc/lang.php.
7808| [CVE-2007-1743] suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
7809| [CVE-2007-1742] suexec in Apache HTTP Server (httpd) 2.2.3 uses a partial comparison for verifying whether the current directory is within the document root, which might allow local users to perform unauthorized operations on incorrect directories, as demonstrated using "html_backup" and "htmleditor" under an "html" directory. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
7810| [CVE-2007-1741] Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
7811| [CVE-2007-1720] Directory traversal vulnerability in addressbook.php in the Addressbook 1.2 module for PHP-Nuke allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the module_name parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file.
7812| [CVE-2007-1636] Directory traversal vulnerability in index.php in RoseOnlineCMS 3 B1 allows remote attackers to include arbitrary files via a .. (dot dot) sequence in the op parameter, as demonstrated by injecting PHP code into Apache log files via the URL and User-Agent HTTP header.
7813| [CVE-2007-1633] Directory traversal vulnerability in bbcode_ref.php in the Giorgio Ciranni Splatt Forum 4.0 RC1 module for PHP-Nuke allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by bbcode_ref.php.
7814| [CVE-2007-1577] Directory traversal vulnerability in index.php in GeBlog 0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the GLOBALS[tplname] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
7815| [CVE-2007-1539] Directory traversal vulnerability in inc/map.func.php in pragmaMX Landkarten 2.1 module allows remote attackers to include arbitrary files via a .. (dot dot) sequence in the module_name parameter, as demonstrated via a static PHP code injection attack in an Apache log file.
7816| [CVE-2007-1524] Directory traversal vulnerability in themes/default/ in ZomPlog 3.7.6 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) in the settings[skin] parameter, as demonstrated by injecting PHP code into an Apache HTTP Server log file, which can then be included via themes/default/.
7817| [CVE-2007-1491] Apache Tomcat in Avaya S87XX, S8500, and S8300 before CM 3.1.3, and Avaya SES allows connections from external interfaces via port 8009, which exposes it to attacks from outside parties.
7818| [CVE-2007-1358] Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
7819| [CVE-2007-1349] PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
7820| [CVE-2007-0975] Variable extraction vulnerability in Ian Bezanson Apache Stats before 0.0.3 beta allows attackers to overwrite critical variables, with unknown impact, when the extract function is used on the _REQUEST superglobal array.
7821| [CVE-2007-0930] Variable extract vulnerability in Apache Stats before 0.0.3beta allows attackers to modify arbitrary variables and conduct attacks via unknown vectors involving the use of PHP's extract function.
7822| [CVE-2007-0792] The mod_perl initialization script in Bugzilla 2.23.3 does not set the Bugzilla Apache configuration to allow .htaccess permissions to override file permissions, which allows remote attackers to obtain the database username and password via a direct request for the localconfig file.
7823| [CVE-2007-0774] Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
7824| [CVE-2007-0637] Directory traversal vulnerability in zd_numer.php in Galeria Zdjec 3.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the galeria parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by zd_numer.php.
7825| [CVE-2007-0451] Apache SpamAssassin before 3.1.8 allows remote attackers to cause a denial of service via long URLs in malformed HTML, which triggers "massive memory usage."
7826| [CVE-2007-0450] Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
7827| [CVE-2007-0419] The BEA WebLogic Server proxy plug-in before June 2006 for the Apache HTTP Server does not properly handle protocol errors, which allows remote attackers to cause a denial of service (server outage).
7828| [CVE-2007-0173] Directory traversal vulnerability in index.php in L2J Statistik Script 0.09 and earlier, when register_globals is enabled and magic_quotes is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
7829| [CVE-2007-0098] Directory traversal vulnerability in language.php in VerliAdmin 0.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
7830| [CVE-2007-0086] ** DISPUTED ** The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal.
7831| [CVE-2006-7217] Apache Derby before 10.2.1.6 does not determine schema privilege requirements during the DropSchemaNode bind phase, which allows remote authenticated users to execute arbitrary drop schema statements in SQL authorization mode.
7832| [CVE-2006-7216] Apache Derby before 10.2.1.6 does not determine privilege requirements for lock table statements at compilation time, and consequently does not enforce privilege requirements at execution time, which allows remote authenticated users to lock arbitrary tables.
7833| [CVE-2006-7197] The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.
7834| [CVE-2006-7196] Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.
7835| [CVE-2006-7195] Cross-site scripting (XSS) vulnerability in implicit-objects.jsp in Apache Tomcat 5.0.0 through 5.0.30 and 5.5.0 through 5.5.17 allows remote attackers to inject arbitrary web script or HTML via certain header values.
7836| [CVE-2006-7098] The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
7837| [CVE-2006-6869] Directory traversal vulnerability in includes/search/search_mdforum.php in MAXdev MDForum 2.0.1 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang cookie to error.php, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
7838| [CVE-2006-6675] Cross-site scripting (XSS) vulnerability in Novell NetWare 6.5 Support Pack 5 and 6 and Novell Apache on NetWare 2.0.48 allows remote attackers to inject arbitrary web script or HTML via unspecifeid parameters in Welcome web-app.
7839| [CVE-2006-6613] Directory traversal vulnerability in language.php in phpAlbum 0.4.1 Beta 6 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files or obtain sensitive information via a .. (dot dot) in the pa_lang[include_file] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
7840| [CVE-2006-6589] Cross-site scripting (XSS) vulnerability in ecommerce/control/keywordsearch in the Apache Open For Business Project (OFBiz) and Opentaps 0.9.3 allows remote attackers to inject arbitrary web script or HTML via the SEARCH_STRING parameter, a different issue than CVE-2006-6587. NOTE: some of these details are obtained from third party information.
7841| [CVE-2006-6588] The forum implementation in the ecommerce component in the Apache Open For Business Project (OFBiz) trusts the (1) dataResourceTypeId, (2) contentTypeId, and certain other hidden form fields, which allows remote attackers to create unauthorized types of content, modify content, or have other unknown impact.
7842| [CVE-2006-6587] Cross-site scripting (XSS) vulnerability in the forum implementation in the ecommerce component in the Apache Open For Business Project (OFBiz) allows remote attackers to inject arbitrary web script or HTML by posting a message.
7843| [CVE-2006-6445] Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
7844| [CVE-2006-6071] TWiki 4.0.5 and earlier, when running under Apache 1.3 using ApacheLogin with sessions and "ErrorDocument 401" redirects to a valid wiki topic, does not properly handle failed login attempts, which allows remote attackers to read arbitrary content by cancelling out of a failed authentication with a valid username and invalid password.
7845| [CVE-2006-6047] Directory traversal vulnerability in manager/index.php in Etomite 0.6.1.2 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the f parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
7846| [CVE-2006-5894] Directory traversal vulnerability in lang.php in Rama CMS 0.68 and earlier, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by lang.php.
7847| [CVE-2006-5752] Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
7848| [CVE-2006-5733] Directory traversal vulnerability in error.php in PostNuke 0.763 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
7849| [CVE-2006-5263] Directory traversal vulnerability in templates/header.php3 in phpMyAgenda 3.1 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter, as demonstrated by a parameter value naming an Apache HTTP Server log file that apparently contains PHP code.
7850| [CVE-2006-4994] Multiple unquoted Windows search path vulnerabilities in Apache Friends XAMPP 1.5.2 might allow local users to gain privileges via a malicious program file in %SYSTEMDRIVE%, which is run when XAMPP attempts to execute (1) FileZillaServer.exe, (2) mysqld-nt.exe, (3) Perl.exe, or (4) xamppcontrol.exe with an unquoted "Program Files" pathname.
7851| [CVE-2006-4636] Directory traversal vulnerability in SZEWO PhpCommander 3.0 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Directory parameter, as demonstrated by parameter values naming Apache HTTP Server log files that apparently contain PHP code.
7852| [CVE-2006-4625] PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.
7853| [CVE-2006-4558] DeluxeBB 1.06 and earlier, when run on the Apache HTTP Server with the mod_mime module, allows remote attackers to execute arbitrary PHP code by uploading files with double extensions via the fileupload parameter in a newthread action in newpost.php.
7854| [CVE-2006-4191] Directory traversal vulnerability in memcp.php in XMB (Extreme Message Board) 1.9.6 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the langfilenew parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by header.php.
7855| [CVE-2006-4154] Format string vulnerability in the mod_tcl module 1.0 for Apache 2.x allows context-dependent attackers to execute arbitrary code via format string specifiers that are not properly handled in a set_var function call in (1) tcl_cmds.c and (2) tcl_core.c.
7856| [CVE-2006-4110] Apache 2.2.2, when running on Windows, allows remote attackers to read source code of CGI programs via a request that contains uppercase (or alternate case) characters that bypass the case-sensitive ScriptAlias directive, but allow access to the file on case-insensitive file systems.
7857| [CVE-2006-4004] Directory traversal vulnerability in index.php in vbPortal 3.0.2 through 3.6.0 Beta 1, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the bbvbplang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
7858| [CVE-2006-3918] http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
7859| [CVE-2006-3835] Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (
7860| [CVE-2006-3747] Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
7861| [CVE-2006-3362] Unrestricted file upload vulnerability in connectors/php/connector.php in FCKeditor mcpuk file manager, as used in (1) Geeklog 1.4.0 through 1.4.0sr3, (2) toendaCMS 1.0.0 Shizouka Stable and earlier, (3) WeBid 0.5.4, and possibly other products, when installed on Apache with mod_mime, allows remote attackers to upload and execute arbitrary PHP code via a filename with a .php extension and a trailing extension that is allowed, such as .zip.
7862| [CVE-2006-3102] Race condition in articles/BitArticle.php in Bitweaver 1.3, when run on Apache with the mod_mime extension, allows remote attackers to execute arbitrary PHP code by uploading arbitrary files with double extensions, which are stored for a small period of time under the webroot in the temp/articles directory.
7863| [CVE-2006-3070] write_ok.php in Zeroboard 4.1 pl8, when installed on Apache with mod_mime, allows remote attackers to bypass restrictions for uploading files with executable extensions by uploading a .htaccess file that with an AddType directive that assigns an executable module to files with assumed-safe extensions, as demonstrated by assigning the txt extension to be handled by application/x-httpd-php.
7864| [CVE-2006-2831] Drupal 4.6.x before 4.6.8 and 4.7.x before 4.7.2, when running under certain Apache configurations such as when FileInfo overrides are disabled within .htaccess, allows remote attackers to execute arbitrary code by uploading a file with multiple extensions, a variant of CVE-2006-2743.
7865| [CVE-2006-2806] The SMTP server in Apache Java Mail Enterprise Server (aka Apache James) 2.2.0 allows remote attackers to cause a denial of service (CPU consumption) via a long argument to the MAIL command.
7866| [CVE-2006-2743] Drupal 4.6.x before 4.6.7 and 4.7.0, when running on Apache with mod_mime, does not properly handle files with multiple extensions, which allows remote attackers to upload, modify, or execute arbitrary files in the files directory.
7867| [CVE-2006-2514] Coppermine galleries before 1.4.6, when running on Apache with mod_mime installed, allows remote attackers to upload arbitrary files via a filename with multiple file extensions.
7868| [CVE-2006-2330] PHP-Fusion 6.00.306 and earlier, running under Apache HTTP Server 1.3.27 and PHP 4.3.3, allows remote authenticated users to upload files of arbitrary types using a filename that contains two or more extensions that ends in an assumed-valid extension such as .gif, which bypasses the validation, as demonstrated by uploading then executing an avatar file that ends in ".php.gif" and contains PHP code in EXIF metadata.
7869| [CVE-2006-1777] Directory traversal vulnerability in doc/index.php in Jeremy Ashcraft Simplog 0.9.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the s parameter, as demonstrated by injecting PHP sequences into an Apache error_log file, which is then included by doc/index.php.
7870| [CVE-2006-1564] Untrusted search path vulnerability in libapache2-svn 1.3.0-4 for Subversion in Debian GNU/Linux includes RPATH values under the /tmp/svn directory for the (1) mod_authz_svn.so and (2) mod_dav_svn.so modules, which might allow local users to gain privileges by installing malicious libraries in that directory.
7871| [CVE-2006-1548] Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message.
7872| [CVE-2006-1547] ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.
7873| [CVE-2006-1546] Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
7874| [CVE-2006-1393] Multiple cross-site scripting (XSS) vulnerabilities in the mod_pubcookie Apache application server module in University of Washington Pubcookie 1.x, 3.0.0, 3.1.0, 3.1.1, 3.2 before 3.2.1b, and 3.3 before 3.3.0a allow remote attackers to inject arbitrary web script or HTML via unspecified attack vectors.
7875| [CVE-2006-1346] Directory traversal vulnerability in inc/setLang.php in Greg Neustaetter gCards 1.45 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in a lang[*][file] parameter, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included by index.php.
7876| [CVE-2006-1292] Directory traversal vulnerability in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in the phpicalendar[cookie_language] and phpicalendar[cookie_style] cookies, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included by day.php.
7877| [CVE-2006-1243] Directory traversal vulnerability in install05.php in Simple PHP Blog (SPB) 0.4.7.1 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in the blog_language parameter, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included using install05.php.
7878| [CVE-2006-1095] Directory traversal vulnerability in the FileSession object in Mod_python module 3.2.7 for Apache allows local users to execute arbitrary code via a crafted session cookie.
7879| [CVE-2006-1079] htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
7880| [CVE-2006-1078] Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
7881| [CVE-2006-0743] Format string vulnerability in LocalSyslogAppender in Apache log4net 1.2.9 might allow remote attackers to cause a denial of service (memory corruption and termination) via unknown vectors.
7882| [CVE-2006-0254] Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.
7883| [CVE-2006-0150] Multiple format string vulnerabilities in the auth_ldap_log_reason function in Apache auth_ldap 1.6.0 and earlier allows remote attackers to execute arbitrary code via various vectors, including the username.
7884| [CVE-2006-0144] The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function.
7885| [CVE-2006-0042] Unspecified vulnerability in (1) apreq_parse_headers and (2) apreq_parse_urlencoded functions in Apache2::Request (Libapreq2) before 2.07 allows remote attackers cause a denial of service (CPU consumption) via unknown attack vectors that result in quadratic computational complexity.
7886| [CVE-2005-4857] eZ publish 3.5 before 3.5.7, 3.6 before 3.6.5, 3.7 before 3.7.3, and 3.8 before 20051128 allows remote authenticated users to cause a denial of service (Apache httpd segmentation fault) via a request to content/advancedsearch.php with an empty SearchContentClassID parameter, reportedly related to a "memory addressing error".
7887| [CVE-2005-4849] Apache Derby before 10.1.2.1 exposes the (1) user and (2) password attributes in cleartext via (a) the RDBNAM parameter of the ACCSEC command and (b) the output of the DatabaseMetaData.getURL function, which allows context-dependent attackers to obtain sensitive information.
7888| [CVE-2005-4836] The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote attackers to read JSP source files and obtain sensitive information.
7889| [CVE-2005-4814] Unrestricted file upload vulnerability in Segue CMS before 1.3.6, when the Apache HTTP Server handles .phtml files with the PHP interpreter, allows remote attackers to upload and execute arbitrary PHP code by placing .phtml files in the userfiles/ directory.
7890| [CVE-2005-4703] Apache Tomcat 4.0.3, when running on Windows, allows remote attackers to obtain sensitive information via a request for a file that contains an MS-DOS device name such as lpt9, which leaks the pathname in an error message, as demonstrated by lpt9.xtp using Nikto.
7891| [CVE-2005-3745] Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
7892| [CVE-2005-3630] Fedora Directory Server before 10 allows remote attackers to obtain sensitive information, such as the password from adm.conf via an IFRAME element, probably involving an Apache httpd.conf configuration that orders "allow" directives before "deny" directives.
7893| [CVE-2005-3510] Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
7894| [CVE-2005-3392] Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives.
7895| [CVE-2005-3357] mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
7896| [CVE-2005-3352] Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.
7897| [CVE-2005-3319] The apache2handler SAPI (sapi_apache2.c) in the Apache module (mod_php) for PHP 5.x before 5.1.0 final and 4.4 before 4.4.1 final allows attackers to cause a denial of service (segmentation fault) via the session.save_path option in a .htaccess file or VirtualHost.
7898| [CVE-2005-3164] The AJP connector in Apache Tomcat 4.0.1 through 4.0.6 and 4.1.0 through 4.1.36, as used in Hitachi Cosminexus Application Server and standalone, does not properly handle when a connection is broken before request body data is sent in a POST request, which can lead to an information leak when "unsuitable request body data" is used for a different request, possibly related to Java Servlet pages.
7899| [CVE-2005-2970] Memory leak in the worker MPM (worker.c) for Apache 2, in certain circumstances, allows remote attackers to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections.
7900| [CVE-2005-2963] The mod_auth_shadow module 1.0 through 1.5 and 2.0 for Apache with AuthShadow enabled uses shadow authentication for all locations that use the require group directive, even when other authentication mechanisms are specified, which might allow remote authenticated users to bypass security restrictions.
7901| [CVE-2005-2728] The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field.
7902| [CVE-2005-2660] apachetop 0.12.5 and earlier, when running in debug mode, allows local users to create or append to arbitrary files via a symlink attack on atop.debug.
7903| [CVE-2005-2088] The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
7904| [CVE-2005-1754] ** DISPUTED ** JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
7905| [CVE-2005-1753] ** DISPUTED ** ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
7906| [CVE-2005-1344] Buffer overflow in htdigest in Apache 2.0.52 may allow attackers to execute arbitrary code via a long realm argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.
7907| [CVE-2005-1268] Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
7908| [CVE-2005-1266] Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries.
7909| [CVE-2005-0808] Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.
7910| [CVE-2005-0182] The mod_dosevasive module 1.9 and earlier for Apache creates temporary files with predictable filenames, which could allow remote attackers to overwrite arbitrary files via a symlink attack.
7911| [CVE-2005-0108] Apache mod_auth_radius 1.5.4 and libpam-radius-auth allow remote malicious RADIUS servers to cause a denial of service (crash) via a RADIUS_REPLY_MESSAGE with a RADIUS attribute length of 1, which leads to a memcpy operation with a -1 length argument.
7912| [CVE-2004-2734] webadmin-apache.conf in Novell Web Manager of Novell NetWare 6.5 uses an uppercase Alias tag with an inconsistent lowercase directory tag for a volume, which allows remote attackers to bypass access control to the WEB-INF folder.
7913| [CVE-2004-2680] mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.
7914| [CVE-2004-2650] Spooler in Apache Foundation James 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak.
7915| [CVE-2004-2343] ** DISPUTED ** Apache HTTP Server 2.0.47 and earlier allows local users to bypass .htaccess file restrictions, as specified in httpd.conf with directives such as Deny From All, by using an ErrorDocument directive. NOTE: the vendor has disputed this issue, since the .htaccess mechanism is only intended to restrict external web access, and a local user already has the privileges to perform the same operations without using ErrorDocument.
7916| [CVE-2004-2336] Unknown vulnerability in Novell GroupWise and GroupWise WebAccess 6.0 through 6.5, when running with Apache Web Server 1.3 for NetWare where Apache is loaded using GWAPACHE.CONF, allows remote attackers to read directories and files on the server.
7917| [CVE-2004-2115] Multiple cross-site scripting (XSS) vulnerabilities in Oracle HTTP Server 1.3.22, based on Apache, allow remote attackers to execute arbitrary script as other users via the (1) action, (2) username, or (3) password parameters in an isqlplus request.
7918| [CVE-2004-1834] mod_disk_cache in Apache 2.0 through 2.0.49 stores client headers, including authentication information, on the hard disk, which could allow local users to gain sensitive information.
7919| [CVE-2004-1765] Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests.
7920| [CVE-2004-1545] UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.
7921| [CVE-2004-1438] The mod_authz_svn Apache module for Subversion 1.0.4-r1 and earlier allows remote authenticated users, with write access to the repository, to read unauthorized parts of the repository via the svn copy command.
7922| [CVE-2004-1405] MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code.
7923| [CVE-2004-1404] Attachment Mod 2.3.10 module for phpBB, when used with Apache mod_mime, does not properly handle files with multiple file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code.
7924| [CVE-2004-1387] The check_forensic script in apache-utils package 1.3.31 allows local users to overwrite or create arbitrary files via a symlink attack on temporary files.
7925| [CVE-2004-1084] Apache for Apple Mac OS X 10.2.8 and 10.3.6 allows remote attackers to read files and resource fork content via HTTP requests to certain special file names related to multiple data streams in HFS+, which bypass Apache file handles.
7926| [CVE-2004-1083] Apache for Apple Mac OS X 10.2.8 and 10.3.6 restricts access to files in a case sensitive manner, but the Apple HFS+ filesystem accesses files in a case insensitive manner, which allows remote attackers to read .DS_Store files and files beginning with ".ht" using alternate capitalization.
7927| [CVE-2004-1082] mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials.
7928| [CVE-2004-0942] Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
7929| [CVE-2004-0940] Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
7930| [CVE-2004-0885] The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration.
7931| [CVE-2004-0811] Unknown vulnerability in Apache 2.0.51 prevents "the merging of the Satisfy directive," which could allow attackers to obtain access to restricted resources contrary to the specified authentication configuration.
7932| [CVE-2004-0809] The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
7933| [CVE-2004-0786] The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.
7934| [CVE-2004-0751] The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).
7935| [CVE-2004-0748] mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.
7936| [CVE-2004-0747] Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables.
7937| [CVE-2004-0700] Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
7938| [CVE-2004-0646] Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields.
7939| [CVE-2004-0529] The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
7940| [CVE-2004-0493] The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.
7941| [CVE-2004-0492] Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
7942| [CVE-2004-0490] cPanel, when compiling Apache 1.3.29 and PHP with the mod_phpsuexec option, does not set the --enable-discard-path option, which causes php to use the SCRIPT_FILENAME variable to find and execute a script instead of the PATH_TRANSLATED variable, which allows local users to execute arbitrary PHP code as other users via a URL that references the attacker's script after the user's script, which executes the attacker's script with the user's privileges, a different vulnerability than CVE-2004-0529.
7943| [CVE-2004-0488] Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.
7944| [CVE-2004-0263] PHP 4.3.4 and earlier in Apache 1.x and 2.x (mod_php) can leak global variables between virtual hosts that are handled by the same Apache child process but have different settings, which could allow remote attackers to obtain sensitive information.
7945| [CVE-2004-0174] Apache 1.4.x before 1.3.30, and 2.0.x before 2.0.49, when using multiple listening sockets on certain platforms, allows remote attackers to cause a denial of service (blocked new connections) via a "short-lived connection on a rarely-accessed listening socket."
7946| [CVE-2004-0173] Directory traversal vulnerability in Apache 1.3.29 and earlier, and Apache 2.0.48 and earlier, when running on Cygwin, allows remote attackers to read arbitrary files via a URL containing "..%5C" (dot dot encoded backslash) sequences.
7947| [CVE-2004-0113] Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.
7948| [CVE-2004-0009] Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.
7949| [CVE-2003-1581] The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS sequences, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
7950| [CVE-2003-1580] The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, uses a logging format that does not identify whether a dotted quad represents an unresolved IP address, which allows remote attackers to spoof IP addresses via crafted DNS responses containing numerical top-level domains, as demonstrated by a forged 123.123.123.123 domain name, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
7951| [CVE-2003-1573] The PointBase 4.6 database component in the J2EE 1.4 reference implementation (J2EE/RI) allows remote attackers to execute arbitrary programs, conduct a denial of service, and obtain sensitive information via a crafted SQL statement, related to "inadequate security settings and library bugs in sun.* and org.apache.* packages."
7952| [CVE-2003-1521] Sun Java Plug-In 1.4 through 1.4.2_02 allows remote attackers to repeatedly access the floppy drive via the createXmlDocument method in the org.apache.crimson.tree.XmlDocument class, which violates the Java security model.
7953| [CVE-2003-1516] The org.apache.xalan.processor.XSLProcessorVersion class in Java Plug-in 1.4.2_01 allows signed and unsigned applets to share variables, which violates the Java security model and could allow remote attackers to read or write data belonging to a signed applet.
7954| [CVE-2003-1502] mod_throttle 3.0 allows local users with Apache privileges to access shared memory that points to a file that is writable by the apache user, which could allow local users to gain privileges.
7955| [CVE-2003-1418] Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child proccess IDs (PID).
7956| [CVE-2003-1307] ** DISPUTED ** The mod_php module for the Apache HTTP Server allows local users with write access to PHP scripts to send signals to the server's process group and use the server's file descriptors, as demonstrated by sending a STOP signal, then intercepting incoming connections on the server's TCP port. NOTE: the PHP developer has disputed this vulnerability, saying "The opened file descriptors are opened by Apache. It is the job of Apache to protect them ... Not a bug in PHP."
7957| [CVE-2003-1172] Directory traversal vulnerability in the view-source sample file in Apache Software Foundation Cocoon 2.1 and 2.2 allows remote attackers to access arbitrary files via a .. (dot dot) in the filename parameter.
7958| [CVE-2003-1171] Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.
7959| [CVE-2003-1138] The default configuration of Apache 2.0.40, as shipped with Red Hat Linux 9.0, allows remote attackers to list directory contents, even if auto indexing is turned off and there is a default web page configured, via a GET request containing a double slash (//).
7960| [CVE-2003-1054] mod_access_referer 1.0.2 allows remote attackers to cause a denial of service (crash) via a malformed Referer header that is missing a hostname, as parsed by the ap_parse_uri_components function in Apache, which triggers a null dereference.
7961| [CVE-2003-0993] mod_access in Apache 1.3 before 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote attackers to bypass intended access restrictions.
7962| [CVE-2003-0987] mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret.
7963| [CVE-2003-0866] The Catalina org.apache.catalina.connector.http package in Tomcat 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service via several requests that do not follow the HTTP protocol, which causes Tomcat to reject later requests.
7964| [CVE-2003-0844] mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode without the Apache log, allows local users to overwrite arbitrary files via (1) a symlink attack on predictable temporary filenames on Unix systems, or (2) an NTFS hard link on Windows systems when the "Strengthen default permissions of internal system objects" policy is not enabled.
7965| [CVE-2003-0843] Format string vulnerability in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode and using the Apache log, allows remote attackers to execute arbitrary code via format string characters in an HTTP GET request with an "Accept-Encoding: gzip" header.
7966| [CVE-2003-0789] mod_cgid in Apache before 2.0.48, when using a threaded MPM, does not properly handle CGI redirect paths, which could cause Apache to send the output of a CGI program to the wrong client.
7967| [CVE-2003-0771] Gallery.pm in Apache::Gallery (aka A::G) uses predictable temporary filenames when running Inline::C, which allows local users to execute arbitrary code by creating and modifying the files before Apache::Gallery does.
7968| [CVE-2003-0658] Docview before 1.1-18 in Caldera OpenLinux 3.1.1, SCO Linux 4.0, OpenServer 5.0.7, configures the Apache web server in a way that allows remote attackers to read arbitrary publicly readable files via a certain URL, possibly related to rewrite rules.
7969| [CVE-2003-0542] Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.
7970| [CVE-2003-0460] The rotatelogs program on Apache before 1.3.28, for Windows and OS/2 systems, does not properly ignore certain control characters that are received over the pipe, which could allow remote attackers to cause a denial of service.
7971| [CVE-2003-0254] Apache 2 before 2.0.47, when running on an IPv6 host, allows attackers to cause a denial of service (CPU consumption by infinite loop) when the FTP proxy server fails to create an IPv6 socket.
7972| [CVE-2003-0253] The prefork MPM in Apache 2 before 2.0.47 does not properly handle certain errors from accept, which could lead to a denial of service.
7973| [CVE-2003-0249] ** DISPUTED ** PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report."
7974| [CVE-2003-0245] Vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library for Apache 2.0.37 through 2.0.45 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors.
7975| [CVE-2003-0192] Apache 2 before 2.0.47, and certain versions of mod_ssl for Apache 1.3, do not properly handle "certain sequences of per-directory renegotiations and the SSLCipherSuite directive being used to upgrade from a weak ciphersuite to a strong one," which could cause Apache to use the weak ciphersuite.
7976| [CVE-2003-0189] The authentication module for Apache 2.0.40 through 2.0.45 on Unix does not properly handle threads safely when using the crypt_r or crypt functions, which allows remote attackers to cause a denial of service (failed Basic authentication with valid usernames and passwords) when a threaded MPM is used.
7977| [CVE-2003-0134] Unknown vulnerability in filestat.c for Apache running on OS2, versions 2.0 through 2.0.45, allows unknown attackers to cause a denial of service via requests related to device names.
7978| [CVE-2003-0132] A memory leak in Apache 2.0 through 2.0.44 allows remote attackers to cause a denial of service (memory consumption) via large chunks of linefeed characters, which causes Apache to allocate 80 bytes for each linefeed.
7979| [CVE-2003-0083] Apache 1.3 before 1.3.25 and Apache 2.0 before version 2.0.46 does not filter terminal escape sequences from its access logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences, a different vulnerability than CVE-2003-0020.
7980| [CVE-2003-0020] Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
7981| [CVE-2003-0017] Apache 2.0 before 2.0.44 on Windows platforms allows remote attackers to obtain certain files via an HTTP request that ends in certain illegal characters such as ">", which causes a different filename to be processed and served.
7982| [CVE-2003-0016] Apache before 2.0.44, when running on unpatched Windows 9x and Me operating systems, allows remote attackers to cause a denial of service or execute arbitrary code via an HTTP request containing MS-DOS device names.
7983| [CVE-2002-2310] ClickCartPro 4.0 stores the admin_user.db data file under the web document root with insufficient access control on servers other than Apache, which allows remote attackers to obtain usernames and passwords.
7984| [CVE-2002-2309] php.exe in PHP 3.0 through 4.2.2, when running on Apache, does not terminate properly, which allows remote attackers to cause a denial of service via a direct request without arguments.
7985| [CVE-2002-2272] Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 through 1.3.27, allows remote attackers to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values.
7986| [CVE-2002-2103] Apache before 1.3.24, when writing to the log file, records a spoofed hostname from the reverse lookup of an IP address, even when a double-reverse lookup fails, which allows remote attackers to hide the original source of activities.
7987| [CVE-2002-2029] PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
7988| [CVE-2002-2012] Unknown vulnerability in Apache 1.3.19 running on HP Secure OS for Linux 1.0 allows remote attackers to cause "unexpected results" via an HTTP request.
7989| [CVE-2002-2009] Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) </, and (4) %20/, which leaks the pathname in an error message.
7990| [CVE-2002-2008] Apache Tomcat 4.0.3 for Windows allows remote attackers to obtain the web root path via an HTTP request for a resource that does not exist, such as lpt9, which leaks the information in an error message.
7991| [CVE-2002-2007] The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages.
7992| [CVE-2002-2006] The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.
7993| [CVE-2002-1895] The servlet engine in Jakarta Apache Tomcat 3.3 and 4.0.4, when using IIS and the ajp1.3 connector, allows remote attackers to cause a denial of service (crash) via a large number of HTTP GET requests for an MS-DOS device such as AUX, LPT1, CON, or PRN.
7994| [CVE-2002-1850] mod_cgi in Apache 2.0.39 and 2.0.40 allows local users and possibly remote attackers to cause a denial of service (hang and memory consumption) by causing a CGI script to send a large amount of data to stderr, which results in a read/write deadlock between httpd and the CGI script.
7995| [CVE-2002-1793] HTTP Server mod_ssl module running on HP-UX 11.04 with Virtualvault OS (VVOS) 4.5 through 4.6 closes the connection when the Apache server times out during an SSL request, which may allow attackers to cause a denial of service.
7996| [CVE-2002-1658] Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow attackers to execute arbitrary code via a long user argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.
7997| [CVE-2002-1635] The Apache configuration file (httpd.conf) in Oracle 9i Application Server (9iAS) uses a Location alias for /perl directory instead of a ScriptAlias, which allows remote attackers to read the source code of arbitrary CGI files via a URL containing the /perl directory instead of /cgi-bin.
7998| [CVE-2002-1593] mod_dav in Apache before 2.0.42 does not properly handle versioning hooks, which may allow remote attackers to kill a child process via a null dereference and cause a denial of service (CPU consumption) in a preforked multi-processing module.
7999| [CVE-2002-1592] The ap_log_rerror function in Apache 2.0 through 2.035, when a CGI application encounters an error, sends error messages to the client that include the full path for the server, which allows remote attackers to obtain sensitive information.
8000| [CVE-2002-1567] Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1 allows remote attackers to execute arbitrary web script and steal cookies via a URL with encoded newlines followed by a request to a .jsp file whose name contains the script.
8001| [CVE-2002-1394] Apache Tomcat 4.0.5 and earlier, when using both the invoker servlet and the default servlet, allows remote attackers to read source code for server files or bypass certain protections, a variant of CAN-2002-1148.
8002| [CVE-2002-1233] A regression error in the Debian distributions of the apache-ssl package (before 1.3.9 on Debian 2.2, and before 1.3.26 on Debian 3.0), for Apache 1.3.27 and earlier, allows local users to read or modify the Apache password file via a symlink attack on temporary files when the administrator runs (1) htpasswd or (2) htdigest, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2001-0131.
8003| [CVE-2002-1157] Cross-site scripting vulnerability in the mod_ssl Apache module 2.8.9 and earlier, when UseCanonicalName is off and wildcard DNS is enabled, allows remote attackers to execute script as other web site visitors, via the server name in an HTTPS response on the SSL port, which is used in a self-referencing URL, a different vulnerability than CAN-2002-0840.
8004| [CVE-2002-1156] Apache 2.0.42 allows remote attackers to view the source code of a CGI script via a POST request to a directory with both WebDAV and CGI enabled.
8005| [CVE-2002-1148] The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
8006| [CVE-2002-0935] Apache Tomcat 4.0.3, and possibly other versions before 4.1.3 beta, allows remote attackers to cause a denial of service (resource exhaustion) via a large number of requests to the server with null characters, which causes the working threads to hang.
8007| [CVE-2002-0843] Buffer overflows in the ApacheBench benchmark support program (ab.c) in Apache before 1.3.27, and Apache 2.x before 2.0.43, allow a malicious web server to cause a denial of service and possibly execute arbitrary code via a long response.
8008| [CVE-2002-0840] Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote attackers to execute script as other web page visitors via the Host: header, a different vulnerability than CAN-2002-1157.
8009| [CVE-2002-0839] The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.
8010| [CVE-2002-0682] Cross-site scripting vulnerability in Apache Tomcat 4.0.3 allows remote attackers to execute script as other web users via script in a URL with the /servlet/ mapping, which does not filter the script when an exception is thrown by the servlet.
8011| [CVE-2002-0661] Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters.
8012| [CVE-2002-0658] OSSP mm library (libmm) before 1.2.0 allows the local Apache user to gain privileges via temporary files, possibly via a symbolic link attack.
8013| [CVE-2002-0654] Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.
8014| [CVE-2002-0653] Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.
8015| [CVE-2002-0513] The PHP administration script in popper_mod 1.2.1 and earlier relies on Apache .htaccess authentication, which allows remote attackers to gain privileges if the script is not appropriately configured by the administrator.
8016| [CVE-2002-0493] Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.
8017| [CVE-2002-0392] Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.
8018| [CVE-2002-0259] InstantServers MiniPortal 1.1.5 and earlier stores sensitive login and account data in plaintext in (1) .pwd files in the miniportal/apache directory, or (2) mplog.txt, which could allow local users to gain privileges.
8019| [CVE-2002-0249] PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
8020| [CVE-2002-0240] PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.
8021| [CVE-2002-0082] The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
8022| [CVE-2002-0061] Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.
8023| [CVE-2001-1556] The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
8024| [CVE-2001-1534] mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication.
8025| [CVE-2001-1510] Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) "%3f.jsp", (2) "?.jsp" or (3) "?" to the requested URL.
8026| [CVE-2001-1449] The default installation of Apache before 1.3.19 on Mandrake Linux 7.1 through 8.0 and Linux Corporate Server 1.0.1 allows remote attackers to list the directory index of arbitrary web directories.
8027| [CVE-2001-1385] The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts.
8028| [CVE-2001-1342] Apache before 1.3.20 on Windows and OS/2 systems allows remote attackers to cause a denial of service (GPF) via an HTTP request for a URI that contains a large number of / (slash) or other characters, which causes certain functions to dereference a null pointer.
8029| [CVE-2001-1217] Directory traversal vulnerability in PL/SQL Apache module in Oracle Oracle 9i Application Server allows remote attackers to access sensitive information via a double encoded URL with .. (dot dot) sequences.
8030| [CVE-2001-1216] Buffer overflow in PL/SQL Apache module in Oracle 9i Application Server allows remote attackers to execute arbitrary code via a long request for a help page.
8031| [CVE-2001-1072] Apache with mod_rewrite enabled on most UNIX systems allows remote attackers to bypass RewriteRules by inserting extra / (slash) characters into the requested path, which causes the regular expression in the RewriteRule to fail.
8032| [CVE-2001-1013] Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server.
8033| [CVE-2001-0925] The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex.
8034| [CVE-2001-0829] A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message.
8035| [CVE-2001-0766] Apache on MacOS X Client 10.0.3 with the HFS+ file system allows remote attackers to bypass access restrictions via a URL that contains some characters whose case is not matched by Apache's filters.
8036| [CVE-2001-0731] Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string.
8037| [CVE-2001-0730] split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header.
8038| [CVE-2001-0729] Apache 1.3.20 on Windows servers allows remote attackers to bypass the default index page and list directory contents via a URL with a large number of / (slash) characters.
8039| [CVE-2001-0590] Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).
8040| [CVE-2001-0131] htpasswd and htdigest in Apache 2.0a9, 1.3.14, and others allows local users to overwrite arbitrary files via a symlink attack.
8041| [CVE-2001-0108] PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.
8042| [CVE-2001-0042] PHP 3.x (PHP3) on Apache 1.3.6 allows remote attackers to read arbitrary files via a modified .. (dot dot) attack containing "%5c" (encoded backslash) sequences.
8043| [CVE-2000-1247] The default configuration of the jserv-status handler in jserv.conf in Apache JServ 1.1.2 includes an "allow from 127.0.0.1" line, which allows local users to discover JDBC passwords or other sensitive information via a direct request to the jserv/ URI.
8044| [CVE-2000-1210] Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.
8045| [CVE-2000-1206] Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files.
8046| [CVE-2000-1205] Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the printenv CGI (printenv.pl), which does not encode its output, (2) pages generated by the ap_send_error_response function such as a default 404, which does not add an explicit charset, or (3) various messages that are generated by certain Apache modules or core code. NOTE: the printenv issue might still exist for web browsers that can render text/plain content types as HTML, such as Internet Explorer, but CVE regards this as a design limitation of those browsers, not Apache. The printenv.pl/acuparam vector, discloser on 20070724, is one such variant.
8047| [CVE-2000-1204] Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root.
8048| [CVE-2000-1168] IBM HTTP Server 1.3.6 (based on Apache) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long GET request.
8049| [CVE-2000-1016] The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL.
8050| [CVE-2000-0913] mod_rewrite in Apache 1.3.12 and earlier allows remote attackers to read arbitrary files if a RewriteRule directive is expanded to include a filename whose name contains a regular expression.
8051| [CVE-2000-0883] The default configuration of mod_perl for Apache as installed on Mandrake Linux 6.1 through 7.1 sets the /perl/ directory to be browseable, which allows remote attackers to list the contents of that directory.
8052| [CVE-2000-0869] The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary diretories via the PROPFIND HTTP request method.
8053| [CVE-2000-0868] The default configuration of Apache 1.3.12 in SuSE Linux 6.4 allows remote attackers to read source code for CGI scripts by replacing the /cgi-bin/ in the requested URL with /cgi-bin-sdb/.
8054| [CVE-2000-0791] Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.
8055| [CVE-2000-0760] The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.
8056| [CVE-2000-0759] Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path.
8057| [CVE-2000-0628] The source.asp example script in the Apache ASP module Apache::ASP 1.93 and earlier allows remote attackers to modify files.
8058| [CVE-2000-0505] The Apache 1.3.x HTTP server for Windows platforms allows remote attackers to list directory contents by requesting a URL containing a large number of / characters.
8059| [CVE-1999-1412] A possible interaction between Apple MacOS X release 1.0 and Apache HTTP server allows remote attackers to cause a denial of service (crash) via a flood of HTTP GET requests to CGI programs, which generates a large number of processes.
8060| [CVE-1999-1293] mod_proxy in Apache 1.2.5 and earlier allows remote attackers to cause a denial of service via malformed FTP commands, which causes Apache to dump core.
8061| [CVE-1999-1237] Multiple buffer overflows in smbvalid/smbval SMB authentication library, as used in Apache::AuthenSmb and possibly other modules, allows remote attackers to execute arbitrary commands via (1) a long username, (2) a long password, and (3) other unspecified methods.
8062| [CVE-1999-1199] Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the "sioux" vulnerability.
8063| [CVE-1999-1053] guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
8064| [CVE-1999-0926] Apache allows remote attackers to conduct a denial of service via a large number of MIME headers.
8065| [CVE-1999-0678] A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
8066| [CVE-1999-0448] IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
8067| [CVE-1999-0289] The Apache web server for Win32 may provide access to restricted files when a . (dot) is appended to a requested URL.
8068| [CVE-1999-0236] ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs.
8069| [CVE-1999-0107] Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters.
8070| [CVE-1999-0071] Apache httpd cookie buffer overflow for versions 1.1.1 and earlier.
8071|
8072| SecurityFocus - https://www.securityfocus.com/bid/:
8073| [104554] Apache HBase CVE-2018-8025 Security Bypass Vulnerability
8074| [104465] Apache Geode CVE-2017-15695 Remote Code Execution Vulnerability
8075| [104418] Apache Storm CVE-2018-8008 Arbitrary File Write Vulnerability
8076| [104399] Apache Storm CVE-2018-1332 User Impersonation Vulnerability
8077| [104348] Apache UIMA CVE-2017-15691 XML External Entity Injection Vulnerability
8078| [104313] Apache NiFi XML External Entity Injection and Denial of Service Vulnerability
8079| [104259] Apache Geode CVE-2017-12622 Authorization Bypass Vulnerability
8080| [104257] Apache Sling XSS Protection API CVE-2017-15717 Cross Site Scripting Vulnerability
8081| [104253] Apache ZooKeeper CVE-2018-8012 Security Bypass Vulnerability
8082| [104252] Apache Batik CVE-2018-8013 Information Disclosure Vulnerability
8083| [104239] Apache Solr CVE-2018-8010 XML External Entity Multiple Information Disclosure Vulnerabilities
8084| [104215] Apache ORC CVE-2018-8015 Denial of Service Vulnerability
8085| [104203] Apache Tomcat CVE-2018-8014 Security Bypass Vulnerability
8086| [104161] Apache Ambari CVE-2018-8003 Directory Traversal Vulnerability
8087| [104140] Apache Derby CVE-2018-1313 Security Bypass Vulnerability
8088| [104135] Apache Tika CVE-2018-1338 Denial of Service Vulnerability
8089| [104008] Apache Fineract CVE-2018-1291 SQL Injection Vulnerability
8090| [104007] Apache Fineract CVE-2018-1292 SQL Injection Vulnerability
8091| [104005] Apache Fineract CVE-2018-1289 SQL Injection Vulnerability
8092| [104001] Apache Tika CVE-2018-1335 Remote Command Injection Vulnerability
8093| [103975] Apache Fineract CVE-2018-1290 SQL Injection Vulnerability
8094| [103974] Apache Solr CVE-2018-1308 XML External Entity Injection Vulnerability
8095| [103772] Apache Traffic Server CVE-2017-7671 Denial of Service Vulnerability
8096| [103770] Apache Traffic Server CVE-2017-5660 Security Bypass Vulnerability
8097| [103751] Apache Hive CVE-2018-1282 SQL Injection Vulnerability
8098| [103750] Apache Hive CVE-2018-1284 Security Bypass Vulnerability
8099| [103692] Apache Ignite CVE-2018-1295 Arbitrary Code Execution Vulnerability
8100| [103528] Apache HTTP Server CVE-2018-1302 Denial of Service Vulnerability
8101| [103525] Apache HTTP Server CVE-2017-15715 Remote Security Bypass Vulnerability
8102| [103524] Apache HTTP Server CVE-2018-1312 Remote Security Bypass Vulnerability
8103| [103522] Apache HTTP Server CVE-2018-1303 Denial of Service Vulnerability
8104| [103520] Apache HTTP Server CVE-2018-1283 Remote Security Vulnerability
8105| [103516] Apache Struts CVE-2018-1327 Denial of Service Vulnerability
8106| [103515] Apache HTTP Server CVE-2018-1301 Denial of Service Vulnerability
8107| [103512] Apache HTTP Server CVE-2017-15710 Denial of Service Vulnerability
8108| [103508] Apache Syncope CVE-2018-1321 Multiple Remote Code Execution Vulnerabilities
8109| [103507] Apache Syncope CVE-2018-1322 Multiple Information Disclosure Vulnerabilities
8110| [103490] Apache Commons Compress CVE-2018-1324 Multiple Denial Of Service Vulnerabilities
8111| [103434] APACHE Allura CVE-2018-1319 HTTP Response Splitting Vulnerability
8112| [103389] Apache Tomcat JK Connector CVE-2018-1323 Directory Traversal Vulnerability
8113| [103222] Apache CloudStack CVE-2013-4317 Information Disclosure Vulnerability
8114| [103219] Apache Xerces-C CVE-2017-12627 Null Pointer Dereference Denial of Service Vulnerability
8115| [103206] Apache Geode CVE-2017-15693 Remote Code Execution Vulnerability
8116| [103205] Apache Geode CVE-2017-15692 Remote Code Execution Vulnerability
8117| [103170] Apache Tomcat CVE-2018-1304 Security Bypass Vulnerability
8118| [103144] Apache Tomcat CVE-2018-1305 Security Bypass Vulnerability
8119| [103102] Apache Oozie CVE-2017-15712 Information Disclosure Vulnerability
8120| [103098] Apache Karaf CVE-2016-8750 LDAP Injection Vulnerability
8121| [103069] Apache Tomcat CVE-2017-15706 Remote Security Weakness
8122| [103068] Apache JMeter CVE-2018-1287 Security Bypass Vulnerability
8123| [103067] Apache Qpid Dispatch Router 'router_core/connections.c' Denial of Service Vulnerability
8124| [103036] Apache CouchDB CVE-2017-12636 Remote Code Execution Vulnerability
8125| [103025] Apache Thrift CVE-2016-5397 Remote Command Injection Vulnerability
8126| [102879] Apache POI CVE-2017-12626 Multiple Denial of Service Vulnerabilities
8127| [102842] Apache NiFi CVE-2017-12632 Host Header Injection Vulnerability
8128| [102815] Apache NiFi CVE-2017-15697 Multiple Cross Site Scripting Vulnerabilities
8129| [102488] Apache Geode CVE-2017-9795 Remote Code Execution Vulnerability
8130| [102229] Apache Sling CVE-2017-15700 Information Disclosure Vulnerability
8131| [102226] Apache Drill CVE-2017-12630 Cross Site Scripting Vulnerability
8132| [102154] Multiple Apache Products CVE-2017-15708 Remote Code Execution Vulnerability
8133| [102127] Apache CXF Fediz CVE-2017-12631 Multiple Cross Site Request Forgery Vulnerabilities
8134| [102041] Apache Qpid Broker-J CVE-2017-15701 Denial of Service Vulnerability
8135| [102040] Apache Qpid Broker CVE-2017-15702 Security Weakness
8136| [102021] Apache Struts CVE-2017-15707 Denial of Service Vulnerability
8137| [101980] EMC RSA Authentication Agent for Web: Apache Web Server Authentication Bypass Vulnerability
8138| [101876] Apache Camel CVE-2017-12634 Deserialization Remote Code Execution Vulnerability
8139| [101874] Apache Camel CVE-2017-12633 Deserialization Remote Code Execution Vulnerability
8140| [101872] Apache Karaf CVE-2014-0219 Local Denial of Service Vulnerability
8141| [101868] Apache CouchDB CVE-2017-12635 Remote Privilege Escalation Vulnerability
8142| [101859] Apache CXF CVE-2017-12624 Denial of Service Vulnerability
8143| [101844] Apache Sling Servlets Post CVE-2017-11296 Cross Site Scripting Vulnerability
8144| [101686] Apache Hive CVE-2017-12625 Information Disclosure Vulnerability
8145| [101644] Apache Wicket CVE-2012-5636 Cross Site Scripting Vulnerability
8146| [101631] Apache Traffic Server CVE-2015-3249 Multiple Remote Code Execution Vulnerabilities
8147| [101630] Apache Traffic Server CVE-2014-3624 Access Bypass Vulnerability
8148| [101625] Apache jUDDI CVE-2009-1197 Security Bypass Vulnerability
8149| [101623] Apache jUDDI CVE-2009-1198 Cross Site Scripting Vulnerability
8150| [101620] Apache Subversion 'libsvn_fs_fs/fs_fs.c' Denial of Service Vulnerability
8151| [101585] Apache OpenOffice Multiple Remote Code Execution Vulnerabilities
8152| [101577] Apache Wicket CVE-2016-6806 Cross Site Request Forgery Vulnerability
8153| [101575] Apache Wicket CVE-2014-0043 Information Disclosure Vulnerability
8154| [101570] Apache Geode CVE-2017-9797 Information Disclosure Vulnerability
8155| [101562] Apache Derby CVE-2010-2232 Arbitrary File Overwrite Vulnerability
8156| [101560] Apache Portable Runtime Utility CVE-2017-12613 Multiple Information Disclosure Vulnerabilities
8157| [101558] Apache Portable Runtime Utility Local Out-of-Bounds Read Denial of Service Vulnerability
8158| [101532] Apache James CVE-2017-12628 Arbitrary Command Execution Vulnerability
8159| [101516] Apache HTTP Server CVE-2017-12171 Security Bypass Vulnerability
8160| [101261] Apache Solr/Lucene CVE-2017-12629 Information Disclosure and Remote Code Execution Vulnerabilities
8161| [101230] Apache Roller CVE-2014-0030 XML External Entity Injection Vulnerability
8162| [101173] Apache IMPALA CVE-2017-9792 Information Disclosure Vulnerability
8163| [101052] Apache Commons Jelly CVE-2017-12621 Security Bypass Vulnerability
8164| [101027] Apache Mesos CVE-2017-7687 Denial of Service Vulnerability
8165| [101023] Apache Mesos CVE-2017-9790 Denial of Service Vulnerability
8166| [100954] Apache Tomcat CVE-2017-12617 Incomplete Fix Remote Code Execution Vulnerability
8167| [100946] Apache Wicket CVE-2014-7808 Cross Site Request Forgery Vulnerability
8168| [100901] Apache Tomcat CVE-2017-12615 Remote Code Execution Vulnerability
8169| [100897] Apache Tomcat CVE-2017-12616 Information Disclosure Vulnerability
8170| [100880] Apache Directory LDAP API CVE-2015-3250 Unspecified Information Disclosure Vulnerability
8171| [100872] Apache HTTP Server CVE-2017-9798 Information Disclosure Vulnerability
8172| [100870] Apache Solr CVE-2017-9803 Remote Privilege Escalation Vulnerability
8173| [100859] puppetlabs-apache CVE-2017-2299 Information Disclosure Vulnerability
8174| [100829] Apache Struts CVE-2017-12611 Remote Code Execution Vulnerability
8175| [100823] Apache Spark CVE-2017-12612 Deserialization Remote Code Execution Vulnerability
8176| [100612] Apache Struts CVE-2017-9804 Incomplete Fix Denial of Service Vulnerability
8177| [100611] Apache Struts CVE-2017-9793 Denial of Service Vulnerability
8178| [100609] Apache Struts CVE-2017-9805 Remote Code Execution Vulnerability
8179| [100587] Apache Atlas CVE-2017-3155 Cross Frame Scripting Vulnerability
8180| [100581] Apache Atlas CVE-2017-3154 Information Disclosure Vulnerability
8181| [100578] Apache Atlas CVE-2017-3153 Cross Site Scripting Vulnerability
8182| [100577] Apache Atlas CVE-2017-3152 Cross Site Scripting Vulnerability
8183| [100547] Apache Atlas CVE-2017-3151 HTML Injection Vulnerability
8184| [100536] Apache Atlas CVE-2017-3150 Cross Site Scripting Vulnerability
8185| [100449] Apache Pony Mail CVE-2016-4460 Authentication Bypass Vulnerability
8186| [100447] Apache2Triad Multiple Security Vulnerabilities
8187| [100284] Apache Sling Servlets Post CVE-2017-9802 Cross Site Scripting Vulnerability
8188| [100280] Apache Tomcat CVE-2017-7674 Security Bypass Vulnerability
8189| [100259] Apache Subversion CVE-2017-9800 Remote Command Execution Vulnerability
8190| [100256] Apache Tomcat CVE-2017-7675 Directory Traversal Vulnerability
8191| [100235] Apache Storm CVE-2017-9799 Remote Code Execution Vulnerability
8192| [100082] Apache Commons Email CVE-2017-9801 SMTP Header Injection Vulnerability
8193| [99873] Apache Sling XSS Protection API CVE-2016-6798 XML External Entity Injection Vulnerability
8194| [99870] Apache Sling API CVE-2016-5394 Cross Site Scripting Vulnerability
8195| [99603] Apache Spark CVE-2017-7678 Cross Site Scripting Vulnerability
8196| [99592] Apache OpenMeetings CVE-2017-7685 Security Bypass Vulnerability
8197| [99587] Apache OpenMeetings CVE-2017-7673 Security Bypass Vulnerability
8198| [99586] Apache OpenMeetings CVE-2017-7688 Security Bypass Vulnerability
8199| [99584] Apache OpenMeetings CVE-2017-7684 Denial of Service Vulnerability
8200| [99577] Apache OpenMeetings CVE-2017-7663 Cross Site Scripting Vulnerability
8201| [99576] Apache OpenMeetings CVE-2017-7664 XML External Entity Injection Vulnerability
8202| [99569] Apache HTTP Server CVE-2017-9788 Memory Corruption Vulnerability
8203| [99568] Apache HTTP Server CVE-2017-9789 Denial of Service Vulnerability
8204| [99563] Apache Struts CVE-2017-7672 Denial of Service Vulnerability
8205| [99562] Apache Struts Spring AOP Functionality Denial of Service Vulnerability
8206| [99509] Apache Impala CVE-2017-5652 Information Disclosure Vulnerability
8207| [99508] Apache IMPALA CVE-2017-5640 Authentication Bypass Vulnerability
8208| [99486] Apache Traffic Control CVE-2017-7670 Denial of Service Vulnerability
8209| [99485] Apache Solr CVE-2017-7660 Security Bypass Vulnerability
8210| [99484] Apache Struts CVE-2017-9791 Remote Code Execution Vulnerability
8211| [99292] Apache Ignite CVE-2017-7686 Information Disclosure Vulnerability
8212| [99170] Apache HTTP Server CVE-2017-7679 Buffer Overflow Vulnerability
8213| [99137] Apache HTTP Server CVE-2017-7668 Denial of Service Vulnerability
8214| [99135] Apache HTTP Server CVE-2017-3167 Authentication Bypass Vulnerability
8215| [99134] Apache HTTP Server CVE-2017-3169 Denial of Service Vulnerability
8216| [99132] Apache HTTP Server CVE-2017-7659 Denial of Service Vulnerability
8217| [99112] Apache Thrift CVE-2015-3254 Denial of Service Vulnerability
8218| [99067] Apache Ranger CVE-2016-8751 HTML Injection Vulnerability
8219| [99018] Apache NiFi CVE-2017-7667 Cross Frame Scripting Vulnerability
8220| [99009] Apache NiFi CVE-2017-7665 Cross Site Scripting Vulnerability
8221| [98961] Apache Ranger CVE-2017-7677 Security Bypass Vulnerability
8222| [98958] Apache Ranger CVE-2017-7676 Security Bypass Vulnerability
8223| [98888] Apache Tomcat CVE-2017-5664 Security Bypass Vulnerability
8224| [98814] Apache Zookeeper CVE-2017-5637 Denial of Service Vulnerability
8225| [98795] Apache Hadoop CVE-2017-7669 Remote Privilege Escalation Vulnerability
8226| [98739] Apache Knox CVE-2017-5646 User Impersonation Vulnerability
8227| [98669] Apache Hive CVE-2016-3083 Security Bypass Vulnerability
8228| [98646] Apache Atlas CVE-2016-8752 Information Disclosure Vulnerability
8229| [98570] Apache Archiva CVE-2017-5657 Multiple Cross-Site Request Forgery Vulnerabilities
8230| [98489] Apache CXF Fediz CVE-2017-7661 Multiple Cross Site Request Forgery Vulnerabilities
8231| [98485] Apache CXF Fediz CVE-2017-7662 Cross Site Request Forgery Vulnerability
8232| [98466] Apache Ambari CVE-2017-5655 Insecure Temporary File Handling Vulnerability
8233| [98365] Apache Cordova For Android CVE-2016-6799 Information Disclosure Vulnerability
8234| [98025] Apache Hadoop CVE-2017-3161 Cross Site Scripting Vulnerability
8235| [98017] Apache Hadoop CVE-2017-3162 Input Validation Vulnerability
8236| [97971] Apache CXF CVE-2017-5656 Information Disclosure Vulnerability
8237| [97968] Apache CXF CVE-2017-5653 Spoofing Vulnerability
8238| [97967] Apache ActiveMQ CVE-2015-7559 Denial of Service Vulnerability
8239| [97949] Apache Traffic Server CVE-2017-5659 Denial of Service Vulnerability
8240| [97948] Apache Batik CVE-2017-5662 XML External Entity Information Disclosure Vulnerability
8241| [97947] Apache FOP CVE-2017-5661 XML External Entity Information Disclosure Vulnerability
8242| [97945] Apache Traffic Server CVE-2016-5396 Denial of Service Vulnerability
8243| [97702] Apache Log4j CVE-2017-5645 Remote Code Execution Vulnerability
8244| [97582] Apache CXF CVE-2016-6812 Cross Site Scripting Vulnerability
8245| [97579] Apache CXF JAX-RS CVE-2016-8739 XML External Entity Injection Vulnerability
8246| [97544] Apache Tomcat CVE-2017-5651 Information Disclosure Vulnerability
8247| [97531] Apache Tomcat CVE-2017-5650 Denial of Service Vulnerability
8248| [97530] Apache Tomcat CVE-2017-5648 Information Disclosure Vulnerability
8249| [97509] Apache Ignite CVE-2016-6805 Information Disclosure and XML External Entity Injection Vulnerabilities
8250| [97383] Apache Flex BlazeDS CVE-2017-5641 Remote Code Execution Vulnerability
8251| [97378] Apache Geode CVE-2017-5649 Information Disclosure Vulnerability
8252| [97229] Apache Ambari CVE-2016-4976 Local Information Disclosure Vulnerability
8253| [97226] Apache Camel CVE-2017-5643 Server Side Request Forgery Security Bypass Vulnerability
8254| [97184] Apache Ambari CVE-2016-6807 Remote Command Execution Vulnerability
8255| [97179] Apache Camel CVE-2016-8749 Java Deserialization Multiple Remote Code Execution Vulnerabilities
8256| [96983] Apache POI CVE-2017-5644 Denial Of Service Vulnerability
8257| [96895] Apache Tomcat CVE-2016-8747 Information Disclosure Vulnerability
8258| [96731] Apache NiFi CVE-2017-5636 Remote Code Injection Vulnerability
8259| [96730] Apache NiFi CVE-2017-5635 Security Bypass Vulnerability
8260| [96729] Apache Struts CVE-2017-5638 Remote Code Execution Vulnerability
8261| [96540] IBM Development Package for Apache Spark CVE-2016-4970 Denial of Service Vulnerability
8262| [96398] Apache CXF CVE-2017-3156 Information Disclosure Vulnerability
8263| [96321] Apache Camel CVE-2017-3159 Remote Code Execution Vulnerability
8264| [96293] Apache Tomcat 'http11/AbstractInputBuffer.java' Denial of Service Vulnerability
8265| [96228] Apache Brooklyn Cross Site Request Forgery and Multiple Cross Site Scripting Vulnerabilities
8266| [95998] Apache Ranger CVE-2016-8746 Security Bypass Vulnerability
8267| [95929] Apache Groovy CVE-2016-6497 Information Disclosure Vulnerability
8268| [95838] Apache Cordova For Android CVE-2017-3160 Man in the Middle Security Bypass Vulnerability
8269| [95675] Apache Struts Remote Code Execution Vulnerability
8270| [95621] Apache NiFi CVE-2106-8748 Cross Site Scripting Vulnerability
8271| [95429] Apache Groovy CVE-2016-6814 Remote Code Execution Vulnerability
8272| [95335] Apache Hadoop CVE-2016-3086 Information Disclosure Vulnerability
8273| [95168] Apache Wicket CVE-2016-6793 Denial of Service Vulnerability
8274| [95136] Apache Qpid Broker for Java CVE-2016-8741 Remote Information Disclosure Vulnerability
8275| [95078] Apache HTTP Server CVE-2016-0736 Remote Security Vulnerability
8276| [95077] Apache HTTP Server CVE-2016-8743 Security Bypass Vulnerability
8277| [95076] Apache HTTP Server CVE-2016-2161 Denial of Service Vulnerability
8278| [95020] Apache Tika CVE-2015-3271 Remote Information Disclosure Vulnerability
8279| [94950] Apache Hadoop CVE-2016-5001 Local Information Disclosure Vulnerability
8280| [94882] Apache ActiveMQ CVE-2016-6810 HTML Injection Vulnerability
8281| [94828] Apache Tomcat CVE-2016-8745 Information Disclosure Vulnerability
8282| [94766] Apache CouchDB CVE-2016-8742 Local Privilege Escalation Vulnerability
8283| [94657] Apache Struts CVE-2016-8738 Denial of Service Vulnerability
8284| [94650] Apache HTTP Server CVE-2016-8740 Denial of Service Vulnerability
8285| [94588] Apache Subversion CVE-2016-8734 XML External Entity Denial of Service Vulnerability
8286| [94513] Apache Karaf CVE-2016-8648 Remote Code Execution Vulnerability
8287| [94463] Apache Tomcat CVE-2016-8735 Remote Code Execution Vulnerability
8288| [94462] Apache Tomcat CVE-2016-6817 Denial of Service Vulnerability
8289| [94461] Apache Tomcat CVE-2016-6816 Security Bypass Vulnerability
8290| [94418] Apache OpenOffice CVE-2016-6803 Local Privilege Escalation Vulnerability
8291| [94247] Apache Tika CVE-2016-6809 Remote Code Execution Vulnerability
8292| [94221] Apache Ranger CVE-2016-6815 Local Privilege Escalation Vulnerability
8293| [94145] Apache OpenMeetings CVE-2016-8736 Remote Code Execution Vulnerability
8294| [93945] Apache CloudStack CVE-2016-6813 Authorization Bypass Vulnerability
8295| [93944] Apache Tomcat Security Manager CVE-2016-6796 Security Bypass Vulnerability
8296| [93943] Apache Tomcat CVE-2016-6794 Security Bypass Vulnerability
8297| [93942] Apache Tomcat Security Manager CVE-2016-5018 Security Bypass Vulnerability
8298| [93940] Apache Tomcat CVE-2016-6797 Security Bypass Vulnerability
8299| [93939] Apache Tomcat CVE-2016-0762 Information Disclosure Vulnerability
8300| [93774] Apache OpenOffice CVE-2016-6804 DLL Loading Remote Code Execution Vulnerability
8301| [93773] Apache Struts CVE-2016-6795 Directory Traversal Vulnerability
8302| [93478] Apache Tomcat CVE-2016-6325 Local Privilege Escalation Vulnerability
8303| [93472] Apache Tomcat CVE-2016-5425 Insecure File Permissions Vulnerability
8304| [93429] Apache Tomcat JK Connector CVE-2016-6808 Remote Buffer Overflow Vulnerability
8305| [93263] Apache Tomcat CVE-2016-1240 Local Privilege Escalation Vulnerability
8306| [93236] Apache MyFaces Trinidad CVE-2016-5019 Remote Code Execution Vulnerability
8307| [93142] Apache ActiveMQ Artemis CVE-2016-4978 Remote Code Execution Vulnerability
8308| [93132] Apache Derby CVE-2015-1832 XML External Entity Information Disclosure Vulnerability
8309| [93044] Apache Zookeeper CVE-2016-5017 Buffer Overflow Vulnerability
8310| [92966] Apache Jackrabbit CVE-2016-6801 Cross-Site Request Forgery Vulnerability
8311| [92947] Apache Shiro CVE-2016-6802 Remote Security Bypass Vulnerability
8312| [92905] Apache CXF Fediz CVE-2016-4464 Security Bypass Vulnerability
8313| [92577] Apache Ranger CVE-2016-5395 HTML Injection Vulnerability
8314| [92331] Apache HTTP Server CVE-2016-1546 Remote Denial of Service Vulnerability
8315| [92328] Apache Hive CVE-2016-0760 Multiple Remote Code Execution Vulnerabilities
8316| [92320] Apache APR-util and httpd CVE-2016-6312 Denial of Service Vulnerability
8317| [92100] Apache POI CVE-2016-5000 XML External Entity Injection Vulnerability
8318| [92079] Apache OpenOffice CVE-2016-1513 Remote Code Execution Vulnerability
8319| [91818] Apache Tomcat CVE-2016-5388 Security Bypass Vulnerability
8320| [91816] Apache HTTP Server CVE-2016-5387 Security Bypass Vulnerability
8321| [91788] Apache Qpid Proton CVE-2016-4467 Certificate Verification Security Bypass Vulnerability
8322| [91738] Apache XML-RPC CVE-2016-5003 Remote Code Execution Vulnerability
8323| [91736] Apache XML-RPC Multiple Security Vulnerabilities
8324| [91707] Apache Archiva CVE-2016-5005 HTML Injection Vulnerability
8325| [91703] Apache Archiva CVE-2016-4469 Multiple Cross-Site Request Forgery Vulnerabilities
8326| [91566] Apache HTTP Server CVE-2016-4979 Authentication Bypass Vulnerability
8327| [91537] Apache QPID CVE-2016-4974 Deserialization Security Bypass Vulnerability
8328| [91501] Apache Xerces-C CVE-2016-4463 Stack Buffer Overflow Vulnerability
8329| [91453] Apache Commons FileUpload CVE-2016-3092 Denial Of Service Vulnerability
8330| [91284] Apache Struts CVE-2016-4431 Security Bypass Vulnerability
8331| [91282] Apache Struts CVE-2016-4433 Security Bypass Vulnerability
8332| [91281] Apache Struts CVE-2016-4430 Cross-Site Request Forgery Vulnerability
8333| [91280] Apache Struts CVE-2016-4436 Security Bypass Vulnerability
8334| [91278] Apache Struts CVE-2016-4465 Denial of Service Vulnerability
8335| [91277] Apache Struts Incomplete Fix Remote Code Execution Vulnerability
8336| [91275] Apache Struts CVE-2016-4438 Remote Code Execution Vulnerability
8337| [91217] Apache Continuum 'saveInstallation.action' Command Execution Vulnerability
8338| [91141] Apache CloudStack CVE-2016-3085 Authentication Bypass Vulnerability
8339| [91068] Apache Struts CVE-2016-1181 Remote Code Execution Vulnerability
8340| [91067] Apache Struts CVE-2016-1182 Security Bypass Vulnerability
8341| [91024] Apache Shiro CVE-2016-4437 Information Disclosure Vulnerability
8342| [90988] Apache Ranger CVE-2016-2174 SQL Injection Vulnerability
8343| [90961] Apache Struts CVE-2016-3093 Denial of Service Vulnerability
8344| [90960] Apache Struts CVE-2016-3087 Remote Code Execution Vulnerability
8345| [90921] Apache Qpid CVE-2016-4432 Authentication Bypass Vulnerability
8346| [90920] Apache Qpid CVE-2016-3094 Denial of Service Vulnerability
8347| [90902] Apache PDFBox CVE-2016-2175 XML External Entity Injection Vulnerability
8348| [90897] Apache Tika CVE-2016-4434 XML External Entity Injection Vulnerability
8349| [90827] Apache ActiveMQ CVE-2016-3088 Multiple Arbitrary File Upload Vulnerabilities
8350| [90755] Apache Ambari CVE-2016-0707 Multiple Local Information Disclosure Vulnerabilities
8351| [90482] Apache CVE-2004-1387 Local Security Vulnerability
8352| [89762] Apache CVE-2001-1556 Remote Security Vulnerability
8353| [89417] Apache Subversion CVE-2016-2167 Authentication Bypass Vulnerability
8354| [89326] RETIRED: Apache Subversion CVE-2016-2167 Security Bypass Vulnerability
8355| [89320] Apache Subversion CVE-2016-2168 Remote Denial of Service Vulnerability
8356| [88826] Apache Struts CVE-2016-3082 Remote Code Execution Vulnerability
8357| [88797] Apache Cordova For iOS CVE-2015-5208 Arbitrary Code Execution Vulnerability
8358| [88764] Apache Cordova iOS CVE-2015-5207 Multiple Security Bypass Vulnerabilities
8359| [88701] Apache CVE-2001-1449 Remote Security Vulnerability
8360| [88635] Apache CVE-2000-1204 Remote Security Vulnerability
8361| [88590] Apache WWW server CVE-1999-1199 Denial-Of-Service Vulnerability
8362| [88496] Apache CVE-2000-1206 Remote Security Vulnerability
8363| [87828] Apache CVE-1999-1237 Remote Security Vulnerability
8364| [87784] Apache CVE-1999-1293 Denial-Of-Service Vulnerability
8365| [87327] Apache Struts CVE-2016-3081 Remote Code Execution Vulnerability
8366| [86622] Apache Stats CVE-2007-0975 Remote Security Vulnerability
8367| [86399] Apache CVE-2007-1743 Local Security Vulnerability
8368| [86397] Apache CVE-2007-1742 Local Security Vulnerability
8369| [86311] Apache Struts CVE-2016-4003 Cross Site Scripting Vulnerability
8370| [86174] Apache Wicket CVE-2015-5347 Cross Site Scripting Vulnerability
8371| [85971] Apache OFBiz CVE-2016-2170 Java Deserialization Remote Code Execution Vulnerability
8372| [85967] Apache OFBiz CVE-2015-3268 HTML Injection Vulnerability
8373| [85759] Apache Jetspeed CVE-2016-2171 Unauthorized Access Vulnerability
8374| [85758] Apache Jetspeed CVE-2016-0712 Cross Site Scripting Vulnerability
8375| [85756] Apache Jetspeed CVE-2016-0710 Multiple SQL Injection Vulnerabilities
8376| [85755] Apache Jetspeed CVE-2016-0711 Mulitple HTML Injection Vulnerabilities
8377| [85754] Apache Jetspeed CVE-2016-0709 Directory Traversal Vulnerability
8378| [85730] Apache Subversion CVE-2015-5343 Integer Overflow Vulnerability
8379| [85691] Apache Ranger CVE-2016-0735 Security Bypass Vulnerability
8380| [85578] Apache ActiveMQ CVE-2010-1244 Cross-Site Request Forgery Vulnerability
8381| [85554] Apache OpenMeetings CVE-2016-2164 Multiple Information Disclosure Vulnerabilities
8382| [85553] Apache OpenMeetings CVE-2016-0783 Information Disclosure Vulnerability
8383| [85552] Apache OpenMeetings CVE-2016-2163 HTML Injection Vulnerability
8384| [85550] Apache OpenMeetings CVE-2016-0784 Directory Traversal Vulnerability
8385| [85386] Apache Hadoop CVE-2015-7430 Local Privilege Escalation Vulnerability
8386| [85377] Apache Qpid Proton Python API CVE-2016-2166 Man in the Middle Security Bypass Vulnerability
8387| [85205] Apache Solr CVE-2015-8796 Cross Site Scripting Vulnerability
8388| [85203] Apache Solr CVE-2015-8795 Mulitple HTML Injection Vulnerabilities
8389| [85163] Apache Geronimo CVE-2008-0732 Local Security Vulnerability
8390| [85131] Apache Struts 'TextParseUtil.translateVariables()' Method Remote Code Execution Vulnerability
8391| [85070] Apache Struts CVE-2016-2162 Cross Site Scripting Vulnerability
8392| [85066] Apache Struts CVE-2016-0785 Remote Code Execution Vulnerability
8393| [84422] Apache TomEE CVE-2016-0779 Unspecified Security Vulnerability
8394| [84321] Apache ActiveMQ CVE-2016-0734 Clickjacking Vulnerability
8395| [84316] Apache ActiveMQ CVE-2016-0782 Multiple Cross Site Scripting Vulnerabilities
8396| [83910] Apache Wicket CVE-2015-7520 Cross Site Scripting Vulnerability
8397| [83423] Apache Xerces-C CVE-2016-0729 Buffer Overflow Vulnerability
8398| [83330] Apache Tomcat CVE-2015-5351 Cross Site Request Forgery Vulnerability
8399| [83329] Apache Tomcat CVE-2015-5174 Directory Traversal Vulnerability
8400| [83328] Apache Tomcat CVE-2015-5345 Directory Traversal Vulnerability
8401| [83327] Apache Tomcat Security Manager CVE-2016-0714 Remote Code Execution Vulnerability
8402| [83326] Apache Tomcat CVE-2016-0763 Security Bypass Vulnerability
8403| [83324] Apache Tomcat Security Manager CVE-2016-0706 Information Disclosure Vulnerability
8404| [83323] Apache Tomcat CVE-2015-5346 Session Fixation Vulnerability
8405| [83259] Apache Hadoop CVE-2015-1776 Information Disclosure Vulnerability
8406| [83243] Apache Solr CVE-2015-8797 Cross Site Scripting Vulnerability
8407| [83119] Apache Sling CVE-2016-0956 Information Disclosure Vulnerability
8408| [83002] Apache CVE-2000-1205 Cross-Site Scripting Vulnerability
8409| [82871] Apache Ranger Authentication Bypass and Security Bypass Vulnerabilities
8410| [82800] Apache CloudStack CVE-2015-3251 Information Disclosure Vulnerability
8411| [82798] Apache CloudStack CVE-2015-3252 Authentication Bypass Vulnerability
8412| [82732] Apache Gallery CVE-2003-0771 Local Security Vulnerability
8413| [82676] Apache CVE-2003-1581 Cross-Site Scripting Vulnerability
8414| [82550] Apache Struts CVE-2015-5209 Security Bypass Vulnerability
8415| [82300] Apache Subversion CVE-2015-5259 Integer Overflow Vulnerability
8416| [82260] Apache Camel CVE-2015-5344 Remote Code Execution Vulnerability
8417| [82234] Apache Hive CVE-2015-7521 Security Bypass Vulnerability
8418| [82082] Apache CVE-1999-0289 Remote Security Vulnerability
8419| [81821] Apache Distribution for Solaris CVE-2007-2080 SQL-Injection Vulnerability
8420| [80696] Apache Camel CVE-2015-5348 Information Disclosure Vulnerability
8421| [80525] Apache CVE-2003-1580 Remote Security Vulnerability
8422| [80354] Drupal Apache Solr Search Module Access Bypass Vulnerability
8423| [80193] Apache CVE-1999-0107 Denial-Of-Service Vulnerability
8424| [79812] Apache Directory Studio CVE-2015-5349 Command Injection Vulnerability
8425| [79744] Apache HBase CVE-2015-1836 Unauthorized Access Vulnerability
8426| [79204] Apache TomEE 'EjbObjectInputStream' Remote Code Execution Vulnerability
8427| [77679] Apache Cordova For Android CVE-2015-8320 Weak Randomization Security Bypass Vulnerability
8428| [77677] Apache Cordova For Android CVE-2015-5256 Security Bypass Vulnerability
8429| [77591] Apache CXF SAML SSO Processing CVE-2015-5253 Security Bypass Vulnerability
8430| [77521] Apache Commons Collections 'InvokerTransformer.java' Remote Code Execution Vulnerability
8431| [77110] Apache HttpComponents HttpClient CVE-2015-5262 Denial of Service Vulnerability
8432| [77086] Apache Ambari CVE-2015-1775 Server Side Request Forgery Security Bypass Vulnerability
8433| [77085] Apache Ambari CVE-2015-3270 Remote Privilege Escalation Vulnerability
8434| [77082] Apache Ambari 'targetURI' Parameter Open Redirection Vulnerability
8435| [77059] Apache Ambari CVE-2015-3186 Cross Site Scripting Vulnerability
8436| [76933] Apache James Server Unspecified Command Execution Vulnerability
8437| [76832] Apache cordova-plugin-file-transfer CVE-2015-5204 HTTP Header Injection Vulnerability
8438| [76625] Apache Struts CVE-2015-5169 Cross Site Scripting Vulnerability
8439| [76624] Apache Struts CVE-2015-2992 Cross Site Scripting Vulnerability
8440| [76522] Apache Tapestry CVE-2014-1972 Security Bypass Vulnerability
8441| [76486] Apache CXF Fediz CVE-2015-5175 Denial of Service Vulnerability
8442| [76452] Apache ActiveMQ CVE-2015-1830 Directory Traversal Vulnerability
8443| [76446] Apache Subversion 'libsvn_fs_fs/tree.c' Denial of Service Vulnerability
8444| [76274] Apache Subversion CVE-2015-3184 Information Disclosure Vulnerability
8445| [76273] Apache Subversion CVE-2015-3187 Information Disclosure Vulnerability
8446| [76272] Apache ActiveMQ CVE-2014-3576 Denial of Service Vulnerability
8447| [76221] Apache Ranger CVE-2015-0266 Access Bypass Vulnerability
8448| [76208] Apache Ranger CVE-2015-0265 JavaScript Code Injection Vulnerability
8449| [76025] Apache ActiveMQ Artemis CVE-2015-3208 XML External Entity Information Disclosure Vulnerability
8450| [75965] Apache HTTP Server CVE-2015-3185 Security Bypass Vulnerability
8451| [75964] Apache HTTP Server CVE-2015-0253 Remote Denial of Service Vulnerability
8452| [75963] Apache HTTP Server CVE-2015-3183 Security Vulnerability
8453| [75940] Apache Struts CVE-2015-1831 Security Bypass Vulnerability
8454| [75919] Apache Groovy CVE-2015-3253 Remote Code Execution Vulnerability
8455| [75338] Apache Storm CVE-2015-3188 Remote Code Execution Vulnerability
8456| [75275] Drupal Apache Solr Real-Time Module Access Bypass Vulnerability
8457| [74866] Apache Cordova For Android CVE-2015-1835 Security Bypass Vulnerability
8458| [74839] Apache Sling API and Sling Servlets CVE-2015-2944 Cross Site Scripting Vulnerability
8459| [74761] Apache Jackrabbit CVE-2015-1833 XML External Entity Information Disclosure Vulnerability
8460| [74686] Apache Ambari '/var/lib/ambari-server/ambari-env.sh' Local Privilege Escalation Vulnerability
8461| [74665] Apache Tomcat CVE-2014-7810 Security Bypass Vulnerability
8462| [74475] Apache Tomcat CVE-2014-0230 Denial of Service Vulnerability
8463| [74423] Apache Struts CVE-2015-0899 Security Bypass Vulnerability
8464| [74338] Apache OpenOffice HWP Filter Memory Corruption Vulnerability
8465| [74265] Apache Tomcat 'mod_jk' CVE-2014-8111 Information Disclosure Vulnerability
8466| [74260] Apache Subversion CVE-2015-0248 Multiple Denial of Service Vulnerabilities
8467| [74259] Apache Subversion 'deadprops.c' Security Bypass Vulnerability
8468| [74204] PHP 'sapi/apache2handler/sapi_apache2.c' Remote Code Execution Vulnerability
8469| [74158] Apache HTTP Server 'protocol.c' Remote Denial of Service Vulnerability
8470| [73954] Apache Flex 'asdoc/templates/index.html' Cross Site Scripting Vulnerability
8471| [73851] Apache2 CVE-2012-0216 Cross-Site Scripting Vulnerability
8472| [73478] Apache Cassandra CVE-2015-0225 Remote Code Execution Vulnerability
8473| [73041] Apache HTTP Server 'mod_lua' Module Denial of Service Vulnerability
8474| [73040] Apache HTTP Server 'mod_lua.c' Local Access Bypass Vulnerability
8475| [72809] Apache Standard Taglibs CVE-2015-0254 XML External Entity Injection Vulnerability
8476| [72717] Apache Tomcat CVE-2014-0227 Chunk Request Remote Denial Of Service Vulnerability
8477| [72557] Apache WSS4J CVE-2015-0227 Security Bypass Vulnerability
8478| [72553] Apache WSS4J CVE-2015-0226 Information Disclosure Vulnerability
8479| [72513] Apache ActiveMQ CVE-2014-3612 LDAP Authentication Bypass Vulnerability
8480| [72511] Apache ActiveMQ CVE-2014-8110 Multiple Cross Site Scripting Vulnerabilities
8481| [72510] Apache ActiveMQ CVE-2014-3600 XML External Entity Injection Vulnerability
8482| [72508] Apache ActiveMQ Apollo CVE-2014-3579 XML External Entity Injection Vulnerability
8483| [72319] Apache Qpid CVE-2015-0223 Security Bypass Vulnerability
8484| [72317] Apache Qpid CVE-2015-0224 Incomplete Fix Multiple Denial of Service Vulnerabilities
8485| [72115] Apache Santuario 'XML Signature Verification' Security Bypass Vulnerability
8486| [72053] Apache HTTP Server 'mod_remoteip.c' IP Address Spoofing Vulnerability
8487| [72030] Apache Qpid CVE-2015-0203 Multiple Denial of Service Vulnerabilities
8488| [71879] Apache Traffic Server 'HttpTransact.cc' Denial of Service Vulnerability
8489| [71726] Apache Subversion CVE-2014-3580 Remote Denial of Service Vulnerability
8490| [71725] Apache Subversion CVE-2014-8108 Remote Denial of Service Vulnerability
8491| [71657] Apache HTTP Server 'mod_proxy_fcgi' Module Denial of Service Vulnerability
8492| [71656] Apache HTTP Server 'mod_cache' Module Denial of Service Vulnerability
8493| [71548] Apache Struts CVE-2014-7809 Security Bypass Vulnerability
8494| [71466] Apache Hadoop CVE-2014-3627 Information Disclosure Vulnerability
8495| [71353] Apache HTTP Server 'LuaAuthzProvider' Authorization Bypass Vulnerability
8496| [71004] Apache Qpid CVE-2014-3629 XML External Entity Injection Vulnerability
8497| [70970] Apache Traffic Server Cross Site Scripting Vulnerability
8498| [70738] Apache CXF CVE-2014-3584 Denial of Service Vulnerability
8499| [70736] Apache CXF SAML SubjectConfirmation Security Bypass Vulnerability
8500| [69728] Apache Tomcat CVE-2013-4444 Arbitrary File Upload Vulnerability
8501| [69648] Apache POI CVE-2014-3574 Denial Of Service Vulnerability
8502| [69647] Apache POI OpenXML parser CVE-2014-3529 XML External Entity Information Disclosure Vulnerability
8503| [69351] Apache OpenOffice Calc CVE-2014-3524 Command Injection Vulnerability
8504| [69295] Apache Axis Incomplete Fix CVE-2014-3596 SSL Certificate Validation Security Bypass Vulnerability
8505| [69286] Apache OFBiz CVE-2014-0232 Multiple Cross Site Scripting Vulnerabilities
8506| [69258] Apache HttpComponents Incomplete Fix CVE-2014-3577 SSL Validation Security Bypass Vulnerability
8507| [69257] Apache HttpComponents Incomplete Fix SSL Certificate Validation Security Bypass Vulnerability
8508| [69248] Apache HTTP Server CVE-2013-4352 Remote Denial of Service Vulnerability
8509| [69237] Apache Subversion CVE-2014-3522 SSL Certificate Validation Information Disclosure Vulnerability
8510| [69173] Apache Traffic Server CVE-2014-3525 Unspecified Security Vulnerability
8511| [69046] Apache Cordova For Android CVE-2014-3502 Information Disclosure Vulnerability
8512| [69041] Apache Cordova For Android CVE-2014-3501 Security Bypass Vulnerability
8513| [69038] Apache Cordova For Android CVE-2014-3500 Security Bypass Vulnerability
8514| [68995] Apache Subversion CVE-2014-3528 Insecure Authentication Weakness
8515| [68966] Apache Subversion 'irkerbridge.py' Local Privilege Escalation Vulnerability
8516| [68965] Apache Subversion 'svnwcsub.py' Local Privilege Escalation Vulnerability
8517| [68863] Apache HTTP Server 'mod_cache' Module Remote Denial of Service Vulnerability
8518| [68747] Apache HTTP Server CVE-2014-3523 Remote Denial of Service Vulnerability
8519| [68745] Apache HTTP Server CVE-2014-0118 Remote Denial of Service Vulnerability
8520| [68742] Apache HTTP Server CVE-2014-0231 Remote Denial of Service Vulnerability
8521| [68740] Apache HTTP Server CVE-2014-0117 Remote Denial of Service Vulnerability
8522| [68678] Apache HTTP Server 'mod_status' CVE-2014-0226 Remote Code Execution Vulnerability
8523| [68445] Apache CXF UsernameToken Information Disclosure Vulnerability
8524| [68441] Apache CXF SAML Tokens Validation Security Bypass Vulnerability
8525| [68431] Apache Syncope CVE-2014-3503 Insecure Password Generation Weakness
8526| [68229] Apache Harmony PRNG Entropy Weakness
8527| [68111] Apache 'mod_wsgi' Module Privilege Escalation Vulnerability
8528| [68072] Apache Tomcat CVE-2014-0186 Remote Denial of Service Vulnerability
8529| [68039] Apache Hive CVE-2014-0228 Security Bypass Vulnerability
8530| [67673] Apache Tomcat CVE-2014-0095 AJP Request Remote Denial Of Service Vulnerability
8531| [67671] Apache Tomcat CVE-2014-0075 Chunk Request Remote Denial Of Service Vulnerability
8532| [67669] Apache Tomcat CVE-2014-0119 XML External Entity Information Disclosure Vulnerability
8533| [67668] Apache Tomcat CVE-2014-0099 Request Processing Information Disclosure Vulnerability
8534| [67667] Apache Tomcat CVE-2014-0096 XML External Entity Information Disclosure Vulnerability
8535| [67534] Apache 'mod_wsgi' Module CVE-2014-0242 Information Disclosure Vulnerability
8536| [67532] Apache 'mod_wsgi' Module Local Privilege Escalation Vulnerability
8537| [67530] Apache Solr Search Template Cross Site Scripting Vulnerability
8538| [67236] Apache CXF CVE-2014-0109 Remote Denial of Service Vulnerability
8539| [67232] Apache CXF CVE-2014-0110 Denial of Service Vulnerability
8540| [67121] Apache Struts ClassLoader Manipulation CVE-2014-0114 Security Bypass Vulnerability
8541| [67081] Apache Struts 'getClass()' Method Security Bypass Vulnerability
8542| [67064] Apache Struts ClassLoader Manipulation Incomplete Fix Security Bypass Vulnerability
8543| [67013] Apache Zookeeper CVE-2014-0085 Local Information Disclosure Vulnerability
8544| [66998] Apache Archiva CVE-2013-2187 Unspecified Cross Site Scripting Vulnerability
8545| [66991] Apache Archiva CVE-2013-2187 HTML Injection Vulnerability
8546| [66927] Apache Syncope CVE-2014-0111 Remote Code Execution Vulnerability
8547| [66474] Apache CouchDB Universally Unique IDentifier (UUID) Remote Denial of Service Vulnerability
8548| [66397] Apache Xalan-Java Library CVE-2014-0107 Security Bypass Vulnerability
8549| [66303] Apache HTTP Server Multiple Denial of Service Vulnerabilities
8550| [66041] RETIRED: Apache Struts CVE-2014-0094 Classloader Manipulation Security Bypass Vulnerability
8551| [65999] Apache Struts ClassLoader Manipulation CVE-2014-0094 Security Bypass Vulnerability
8552| [65967] Apache Cordova File-Transfer Unspecified Security Vulnerability
8553| [65959] Apache Cordova InAppBrowser Remote Privilege Escalation Vulnerability
8554| [65935] Apache Shiro 'login.jsp' Authentication Bypass Vulnerability
8555| [65902] Apache Camel CVE-2014-0003 Remote Code Execution Vulnerability
8556| [65901] Apache Camel CVE-2014-0002 XML External Entity Information Disclosure Vulnerability
8557| [65773] Apache Tomcat CVE-2013-4286 Security Bypass Vulnerability
8558| [65769] Apache Tomcat CVE-2014-0033 Session Fixation Vulnerability
8559| [65768] Apache Tomcat CVE-2013-4590 XML External Entity Information Disclosure Vulnerability
8560| [65767] Apache Tomcat CVE-2013-4322 Incomplete Fix Denial of Service Vulnerability
8561| [65615] Apache ActiveMQ 'refresh' Parameter Cross Site Scripting Vulnerability
8562| [65434] Apache Subversion 'mod_dav_svn' Module SVNListParentPath Denial of Service Vulnerability
8563| [65431] Apache Wicket CVE-2013-2055 Information Disclosure Vulnerability
8564| [65400] Apache Commons FileUpload CVE-2014-0050 Denial Of Service Vulnerability
8565| [64782] Apache CloudStack Virtual Router Component Security Bypass Vulnerability
8566| [64780] Apache CloudStack Unauthorized Access Vulnerability
8567| [64617] Apache Libcloud Digital Ocean API Local Information Disclosure Vulnerability
8568| [64437] Apache Santuario XML Security For JAVA XML Signature Denial of Service Vulnerability
8569| [64427] Apache Solr Multiple XML External Entity Injection Vulnerabilities
8570| [64009] Apache Solr CVE-2013-6408 XML External Entity Injection Vulnerability
8571| [64008] Apache Solr CVE-2013-6407 XML External Entity Injection Vulnerability
8572| [63981] Apache Subversion 'mod_dav_svn' Module Denial of Service Vulnerability
8573| [63966] Apache Subversion CVE-2013-4505 Security Bypass Vulnerability
8574| [63963] Apache Roller CVE-2013-4171 Cross Site Scripting Vulnerability
8575| [63935] Apache Solr 'SolrResourceLoader' Directory Traversal Vulnerability
8576| [63928] Apache Roller CVE-2013-4212 OGNL Expression Injection Remote Code Execution Vulnerability
8577| [63515] Apache Tomcat Manager Component CVE-2013-6357 Cross Site Request Forgery Vulnerability
8578| [63403] Apache Struts Multiple Cross Site Scripting Vulnerabilities
8579| [63400] Apache 'mod_pagespeed' Module Unspecified Cross Site Scripting Vulnerability
8580| [63260] Apache Shindig CVE-2013-4295 XML External Entity Information Disclosure Vulnerability
8581| [63241] Apache Sling 'AbstractAuthenticationFormServlet' Open Redirection Vulnerability
8582| [63174] Apache Commons FileUpload 'DiskFileItem' Class Null Byte Arbitrary File Write Vulnerability
8583| [62939] Apache 'mod_fcgid' Module CVE-2013-4365 Heap Buffer Overflow Vulnerability
8584| [62903] Apache Sling 'deepGetOrCreateNode()' Function Denial Of Service Vulnerability
8585| [62706] Apache Camel CVE-2013-4330 Information Disclosure Vulnerability
8586| [62677] Apache 'mod_accounting' Module CVE-2013-5697 SQL Injection Vulnerability
8587| [62674] TYPO3 Apache Solr Unspecified Cross Site Scripting and PHP Code Execution Vulnerabilities
8588| [62587] Apache Struts CVE-2013-4316 Remote Code Execution Vulnerability
8589| [62584] Apache Struts CVE-2013-4310 Security Bypass Vulnerability
8590| [62266] Apache Subversion CVE-2013-4277 Insecure Temporary File Creation Vulnerability
8591| [61984] Apache Hadoop RPC Authentication CVE-2013-2192 Man in the Middle Security Bypass Vulnerability
8592| [61981] Apache HBase RPC Authentication Man In The Middle Security Bypass Vulnerability
8593| [61638] Apache CloudStack CVE-2013-2136 Multiple Cross Site Scripting Vulnerabilities
8594| [61454] Apache Subversion CVE-2013-4131 Denial Of Service Vulnerability
8595| [61379] Apache HTTP Server CVE-2013-2249 Unspecified Remote Security Vulnerability
8596| [61370] Apache OFBiz CVE-2013-2317 'View Log' Cross Site Scripting Vulnerability
8597| [61369] Apache OFBiz Nested Expression Remote Code Execution Vulnerability
8598| [61196] Apache Struts CVE-2013-2248 Multiple Open Redirection Vulnerabilities
8599| [61189] Apache Struts CVE-2013-2251 Multiple Remote Command Execution Vulnerabilities
8600| [61129] Apache HTTP Server CVE-2013-1896 Remote Denial of Service Vulnerability
8601| [61030] Apache CXF CVE-2013-2160 Multiple Remote Denial of Service Vulnerabilities
8602| [60875] Apache Geronimo RMI Classloader Security Bypass Vulnerability
8603| [60846] Apache Santuario XML Security for JAVA XML Signature CVE-2013-2172 Security Bypass Vulnerability
8604| [60817] Apache Santuario XML Security for C++ CVE-2013-2210 Heap Buffer Overflow Vulnerability
8605| [60800] Apache Qpid Python Client SSL Certificate Verification Information Disclosure Vulnerability
8606| [60599] Apache Santuario XML Security for C++ CVE-2013-2156 Remote Heap Buffer Overflow Vulnerability
8607| [60595] Apache Santuario XML Security for C++ XML Signature CVE-2013-2155 Denial of Service Vulnerability
8608| [60594] Apache Santuario XML Security for C++ CVE-2013-2154 Stack Buffer Overflow Vulnerability
8609| [60592] Apache Santuario XML Security for C++ XML Signature CVE-2013-2153 Security Bypass Vulnerability
8610| [60534] Apache OpenJPA Object Deserialization Arbitrary File Creation or Overwrite Vulnerability
8611| [60346] Apache Struts CVE-2013-2134 OGNL Expression Injection Vulnerability
8612| [60345] Apache Struts CVE-2013-2135 OGNL Expression Injection Vulnerability
8613| [60267] Apache Subversion CVE-2013-1968 Remote Denial of Service Vulnerability
8614| [60265] Apache Subversion CVE-2013-2088 Command Injection Vulnerability
8615| [60264] Apache Subversion CVE-2013-2112 Remote Denial of Service Vulnerability
8616| [60187] Apache Tomcat DIGEST Authentication CVE-2013-2051 Incomplete Fix Security Weakness
8617| [60186] Apache Tomcat CVE-2013-1976 Insecure Temporary File Handling Vulnerability
8618| [60167] Apache Struts 'includeParams' CVE-2013-2115 Incomplete Fix Security Bypass Vulnerability
8619| [60166] Apache Struts 'includeParams' CVE-2013-1966 Security Bypass Vulnerability
8620| [60082] Apache Struts 'ParameterInterceptor' Class OGNL CVE-2013-1965 Security Bypass Vulnerability
8621| [59826] Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
8622| [59799] Apache Tomcat CVE-2013-2067 Session Fixation Vulnerability
8623| [59798] Apache Tomcat CVE-2013-2071 Information Disclosure Vulnerability
8624| [59797] Apache Tomcat CVE-2012-3544 Denial of Service Vulnerability
8625| [59670] Apache VCL Multiple Input Validation Vulnerabilities
8626| [59464] Apache CloudStack CVE-2013-2758 Hash Information Disclosure Vulnerability
8627| [59463] Apache CloudStack CVE-2013-2756 Authentication Bypass Vulnerability
8628| [59402] Apache ActiveMQ CVE-2013-3060 Information Disclosure and Denial of Service Vulnerability
8629| [59401] Apache ActiveMQ CVE-2012-6551 Denial of Service Vulnerability
8630| [59400] Apache ActiveMQ CVE-2012-6092 Multiple Cross Site Scripting Vulnerabilities
8631| [58898] Apache Subversion CVE-2013-1884 Remote Denial of Service Vulnerability
8632| [58897] Apache Subversion 'mod_dav_svn/lock.c' Remote Denial of Service Vulnerability
8633| [58895] Apache Subversion 'mod_dav_svn' Remote Denial of Service Vulnerability
8634| [58455] Apache Rave User RPC API CVE-2013-1814 Information Disclosure Vulnerability
8635| [58379] Apache Qpid CVE-2012-4446 Authentication Bypass Vulnerability
8636| [58378] Apache Qpid CVE-2012-4460 Denial of Service Vulnerability
8637| [58376] Apache Qpid CVE-2012-4458 Denial of Service Vulnerability
8638| [58337] Apache Qpid CVE-2012-4459 Denial of Service Vulnerability
8639| [58326] Apache Commons FileUpload CVE-2013-0248 Insecure Temporary File Creation Vulnerability
8640| [58325] Debian Apache HTTP Server CVE-2013-1048 Symlink Attack Local Privilege Escalation Vulnerability
8641| [58323] Apache Subversion 'svn_fs_file_length()' Remote Denial of Service Vulnerability
8642| [58165] Apache HTTP Server Multiple Cross Site Scripting Vulnerabilities
8643| [58136] Apache Maven CVE-2013-0253 SSL Certificate Validation Security Bypass Vulnerability
8644| [58124] Apache Tomcat 'log/logdir' Directory Insecure File Permissions Vulnerability
8645| [58073] Apache Commons HttpClient CVE-2012-5783 SSL Certificate Validation Security Bypass Vulnerability
8646| [57876] Apache CXF WS-SecurityPolicy Authentication Bypass Vulnerability
8647| [57874] Apache CXF CVE-2012-5633 Security Bypass Vulnerability
8648| [57463] Apache OFBiz CVE-2013-0177 Multiple Cross Site Scripting Vulnerabilities
8649| [57425] Apache CXF CVE-2012-5786 SSL Certificate Validation Security Bypass Vulnerability
8650| [57321] Apache CouchDB CVE-2012-5650 Cross Site Scripting Vulnerability
8651| [57314] Apache CouchDB CVE-2012-5649 Remote Code Execution Vulnerability
8652| [57267] Apache Axis2/C SSL Certificate Validation Security Bypass Vulnerability
8653| [57259] Apache CloudStack CVE-2012-5616 Local Information Disclosure Vulnerability
8654| [56814] Apache Tomcat CVE-2012-4431 Cross-Site Request Forgery Vulnerability
8655| [56813] Apache Tomcat CVE-2012-4534 Denial of Service Vulnerability
8656| [56812] Apache Tomcat CVE-2012-3546 Security Bypass Vulnerability
8657| [56753] Apache Apache HTTP Server 'mod_proxy_ajp Module Denial Of Service Vulnerability
8658| [56686] Apache Tomcat CVE-2012-5568 Denial of Service Vulnerability
8659| [56408] Apache Axis and Axis2/Java SSL Certificate Validation Security Bypass Vulnerability
8660| [56403] Apache Tomcat DIGEST Authentication Multiple Security Weaknesses
8661| [56402] Apache Tomcat CVE-2012-2733 Denial of Service Vulnerability
8662| [56171] Apache OFBiz CVE-2012-3506 Unspecified Security Vulnerability
8663| [55876] Apache CloudStack CVE-2012-4501 Security Bypass Vulnerability
8664| [55628] Apache CXF SOAP Action Spoofing Security Bypass Vulnerability
8665| [55608] Apache Qpid (qpidd) Denial of Service Vulnerability
8666| [55536] Apache 'mod_pagespeed' Module Cross Site Scripting and Security Bypass Vulnerabilities
8667| [55508] Apache Axis2 XML Signature Wrapping Security Vulnerability
8668| [55445] Apache Wicket CVE-2012-3373 Cross Site Scripting Vulnerability
8669| [55346] Apache Struts Cross Site Request Forgery and Denial of Service Vulnerabilities
8670| [55290] Drupal Apache Solr Autocomplete Module Cross Site Scripting Vulnerability
8671| [55165] Apache Struts2 Skill Name Remote Code Execution Vulnerability
8672| [55154] Apache 'mod-rpaf' Module Denial of Service Vulnerability
8673| [55131] Apache HTTP Server HTML-Injection And Information Disclosure Vulnerabilities
8674| [54954] Apache QPID NullAuthenticator Authentication Bypass Vulnerability
8675| [54798] Apache Libcloud Man In The Middle Vulnerability
8676| [54358] Apache Hadoop CVE-2012-3376 Information Disclosure Vulnerability
8677| [54341] Apache Sling CVE-2012-2138 Denial Of Service Vulnerability
8678| [54268] Apache Hadoop Symlink Attack Local Privilege Escalation Vulnerability
8679| [54189] Apache Roller Cross Site Request Forgery Vulnerability
8680| [54187] Apache Roller CVE-2012-2381 Cross Site Scripting Vulnerability
8681| [53880] Apache CXF Child Policies Security Bypass Vulnerability
8682| [53877] Apache CXF Elements Validation Security Bypass Vulnerability
8683| [53676] Apache Commons Compress and Apache Ant CVE-2012-2098 Denial Of Service Vulnerability
8684| [53487] Apache POI CVE-2012-0213 Denial Of Service Vulnerability
8685| [53455] PHP 'apache_request_headers()' Function Buffer Overflow Vulnerability
8686| [53305] Apache Qpid CVE-2011-3620 Unauthorized Access Security Bypass Vulnerability
8687| [53046] Apache HTTP Server 'LD_LIBRARY_PATH' Insecure Library Loading Arbitrary Code Execution Vulnerability
8688| [53025] Apache OFBiz Unspecified Remote Code Execution Vulnerability
8689| [53023] Apache OFBiz Multiple Cross Site Scripting Vulnerabilities
8690| [52939] Apache Hadoop CVE-2012-1574 Unspecified User Impersonation Vulnerability
8691| [52702] Apache Struts2 'XSLTResult.java' Remote Arbitrary File Upload Vulnerability
8692| [52696] Apache Traffic Server HTTP Host Header Handling Heap Based Buffer Overflow Vulnerability
8693| [52680] Apache Wicket 'pageMapName' Parameter Cross Site Scripting Vulnerability
8694| [52679] Apache Wicket Hidden Files Information Disclosure Vulnerability
8695| [52565] Apache 'mod_fcgid' Module Denial Of Service Vulnerability
8696| [52146] TYPO3 Apache Solr Extension Unspecified Cross Site Scripting Vulnerability
8697| [51939] Apache MyFaces 'ln' Parameter Information Disclosure Vulnerability
8698| [51917] Apache APR Hash Collision Denial Of Service Vulnerability
8699| [51902] Apache Struts Multiple HTML Injection Vulnerabilities
8700| [51900] Apache Struts CVE-2012-1007 Multiple Cross Site Scripting Vulnerabilities
8701| [51886] Apache CXF UsernameToken Policy Validation Security Bypass Vulnerability
8702| [51869] Apache HTTP Server CVE-2011-3639 'mod_proxy' Reverse Proxy Security Bypass Vulnerability
8703| [51706] Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability
8704| [51705] Apache HTTP Server CVE-2012-0021 mod_log_config Denial Of Service Vulnerability
8705| [51628] Apache Struts 'ParameterInterceptor' Class OGNL (CVE-2011-3923) Security Bypass Vulnerability
8706| [51447] Apache Tomcat Parameter Handling Denial of Service Vulnerability
8707| [51442] Apache Tomcat Request Object Security Bypass Vulnerability
8708| [51407] Apache HTTP Server Scoreboard Local Security Bypass Vulnerability
8709| [51257] Apache Struts Remote Command Execution and Arbitrary File Overwrite Vulnerabilities
8710| [51238] Apache Geronimo Hash Collision Denial Of Service Vulnerability
8711| [51200] Apache Tomcat Hash Collision Denial Of Service Vulnerability
8712| [50940] Apache Struts Session Tampering Security Bypass Vulnerability
8713| [50912] RETIRED: Apache MyFaces CVE-2011-4343 Information Disclosure Vulnerability
8714| [50904] Apache ActiveMQ Failover Mechanism Remote Denial Of Service Vulnerability
8715| [50848] Apache MyFaces EL Expression Evaluation Security Bypass Vulnerability
8716| [50802] Apache HTTP Server 'mod_proxy' Reverse Proxy Security Bypass Vulnerability
8717| [50639] Apache HTTP Server 'ap_pregsub()' Function Local Denial of Service Vulnerability
8718| [50603] Apache Tomcat Manager Application Security Bypass Vulnerability
8719| [50494] Apache HTTP Server 'ap_pregsub()' Function Local Privilege Escalation Vulnerability
8720| [49957] Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
8721| [49762] Apache Tomcat HTTP DIGEST Authentication Multiple Security Weaknesses
8722| [49728] Apache Struts Conversion Error OGNL Expression Evaluation Vulnerability
8723| [49616] Apache HTTP Server CVE-2011-3348 Denial Of Service Vulnerability
8724| [49470] Apache Tomcat CVE-2007-6286 Duplicate Request Processing Security Vulnerability
8725| [49353] Apache Tomcat AJP Protocol Security Bypass Vulnerability
8726| [49303] Apache HTTP Server CVE-2011-3192 Denial Of Service Vulnerability
8727| [49290] Apache Wicket Cross Site Scripting Vulnerability
8728| [49147] Apache Tomcat CVE-2011-2481 Information Disclosure Vulnerability
8729| [49143] Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability
8730| [48667] Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability
8731| [48653] Apache 'mod_authnz_external' Module SQL Injection Vulnerability
8732| [48611] Apache XML Security for C++ Signature Key Parsing Denial of Service Vulnerability
8733| [48456] Apache Tomcat 'MemoryUserDatabase' Information Disclosure Vulnerability
8734| [48015] Apache Archiva Multiple Cross Site Request Forgery Vulnerabilities
8735| [48011] Apache Archiva Multiple Cross Site Scripting and HTML Injection Vulnerabilities
8736| [47929] Apache APR 'apr_fnmatch.c' Denial of Service Vulnerability
8737| [47890] Apache Struts 'javatemplates' Plugin Multiple Cross Site Scripting Vulnerabilities
8738| [47886] Apache Tomcat SecurityConstraints Security Bypass Vulnerability
8739| [47820] Apache APR 'apr_fnmatch()' Denial of Service Vulnerability
8740| [47784] Apache Struts XWork 's:submit' HTML Tag Cross Site Scripting Vulnerability
8741| [47199] Apache Tomcat HTTP BIO Connector Information Disclosure Vulnerability
8742| [47196] Apache Tomcat Login Constraints Security Bypass Vulnerability
8743| [46974] Apache HttpComponents 'HttpClient' Information Disclosure Vulnerability
8744| [46953] Apache MPM-ITK Module Security Weakness
8745| [46734] Subversion 'mod_dav_svn' Apache Server NULL Pointer Dereference Denial Of Service Vulnerability
8746| [46685] Apache Tomcat '@ServletSecurity' Annotations Security Bypass Vulnerability
8747| [46311] Apache Continuum and Archiva Cross Site Scripting Vulnerability
8748| [46177] Apache Tomcat SecurityManager Security Bypass Vulnerability
8749| [46174] Apache Tomcat HTML Manager Interface HTML Injection Vulnerability
8750| [46166] Apache Tomcat JVM Denial of Service Vulnerability
8751| [46164] Apache Tomcat NIO Connector Denial of Service Vulnerability
8752| [46066] Apache CouchDB Web Administration Interface Cross Site Scripting Vulnerability
8753| [45655] Apache Subversion Server Component Multiple Remote Denial Of Service Vulnerabilities
8754| [45123] Awstats Apache Tomcat Configuration File Remote Arbitrary Command Execution Vulnerability
8755| [45095] Apache Archiva Cross Site Request Forgery Vulnerability
8756| [45015] Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities
8757| [44900] Apache 'mod_fcgid' Module Unspecified Stack Buffer Overflow Vulnerability
8758| [44616] Apache Shiro Directory Traversal Vulnerability
8759| [44355] Apache MyFaces Encrypted View State Oracle Padding Security Vulnerability
8760| [44068] Apache::AuthenHook Local Information Disclosure Vulnerability
8761| [43862] Apache QPID SSL Connection Denial of Service Vulnerability
8762| [43673] Apache APR-util 'apr_brigade_split_line()' Denial of Service Vulnerability
8763| [43637] Apache XML-RPC SAX Parser Information Disclosure Vulnerability
8764| [43111] Apache Traffic Server Remote DNS Cache Poisoning Vulnerability
8765| [42637] Apache Derby 'BUILTIN' Authentication Insecure Password Hashing Vulnerability
8766| [42501] Apache CouchDB Cross Site Request Forgery Vulnerability
8767| [42492] Apache CXF XML DTD Processing Security Vulnerability
8768| [42121] Apache SLMS Insufficient Quoting Cross Site Request Forgery Vulnerability
8769| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
8770| [41963] Apache HTTP Server Multiple Remote Denial of Service Vulnerabilities
8771| [41544] Apache Tomcat 'Transfer-Encoding' Information Disclosure and Denial Of Service Vulnerabilities
8772| [41076] Apache Axis2 '/axis2/axis2-admin' Session Fixation Vulnerability
8773| [40976] Apache Axis2 Document Type Declaration Processing Security Vulnerability
8774| [40827] Apache 'mod_proxy_http' Timeout Handling Information Disclosure Vulnerability
8775| [40343] Apache Axis2 'xsd' Parameter Directory Traversal Vulnerability
8776| [40327] Apache Axis2 'engagingglobally' Cross-Site Scripting Vulnerability
8777| [39771] Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
8778| [39636] Apache ActiveMQ Source Code Information Disclosure Vulnerability
8779| [39635] Apache Tomcat Authentication Header Realm Name Information Disclosure Vulnerability
8780| [39538] Apache mod_auth_shadow Race Condition Security Bypass Vulnerability
8781| [39489] Apache OFBiz Multiple Cross Site Scripting and HTML Injection Vulnerabilities
8782| [39119] Apache ActiveMQ 'createDestination.action' HTML Injection Vulnerability
8783| [38580] Apache Subrequest Handling Information Disclosure Vulnerability
8784| [38494] Apache 'mod_isapi' Memory Corruption Vulnerability
8785| [38491] Apache mod_proxy_ajp Module Incoming Request Body Denial Of Service Vulnerability
8786| [37966] Apache 1.3 mod_proxy HTTP Chunked Encoding Integer Overflow Vulnerability
8787| [37945] Apache Tomcat Host Working Directory WAR File Directory Traversal Vulnerability
8788| [37944] Apache Tomcat WAR File Directory Traversal Vulnerability
8789| [37942] Apache Tomcat Directory Host Appbase Authentication Bypass Vulnerability
8790| [37149] Apache Tomcat 404 Error Page Cross Site Scripting Vulnerability
8791| [37027] RETIRED: Apache APR 'apr_uri_parse_hostinfo' Off By One Remote Code Execution Vulnerability
8792| [36990] Apache HTTP TRACE Cross Site Scripting Vulnerability
8793| [36954] Apache Tomcat Windows Installer Insecure Password Vulnerability
8794| [36889] TYPO3 Apache Solr Search Extension Unspecified Cross Site Scripting Vulnerability
8795| [36596] Apache HTTP Server Solaris Event Port Pollset Support Remote Denial Of Service Vulnerability
8796| [36260] Apache mod_proxy_ftp Module NULL Pointer Dereference Denial Of Service Vulnerability
8797| [36254] Apache mod_proxy_ftp Remote Command Injection Vulnerability
8798| [35949] Apache APR and APR-util Multiple Integer Overflow Vulnerabilities
8799| [35840] Apache HTTP Server HTTP-Basic Authentication Bypass Vulnerability
8800| [35623] Apache 'mod_deflate' Remote Denial Of Service Vulnerability
8801| [35565] Apache 'mod_proxy' Remote Denial Of Service Vulnerability
8802| [35416] Apache Tomcat XML Parser Information Disclosure Vulnerability
8803| [35263] Apache Tomcat 'RequestDispatcher' Information Disclosure Vulnerability
8804| [35253] Apache APR-util 'xml/apr_xml.c' Denial of Service Vulnerability
8805| [35251] Apache APR-util 'apr_brigade_vprintf' Off By One Vulnerability
8806| [35221] Apache APR-util 'apr_strmatch_precompile()' Integer Underflow Vulnerability
8807| [35196] Apache Tomcat Form Authentication Existing/Non-Existing Username Enumeration Weakness
8808| [35193] Apache Tomcat Java AJP Connector Invalid Header Denial of Service Vulnerability
8809| [35115] Apache 'Options' and 'AllowOverride' Directives Security Bypass Vulnerability
8810| [34686] Apache Struts Multiple Cross Site Scripting Vulnerabilities
8811| [34663] Apache 'mod_proxy_ajp' Information Disclosure Vulnerability
8812| [34657] Apache Tiles Cross Site Scripting And Information Disclosure Vulnerabilities
8813| [34562] Apache Geronimo Application Server Multiple Remote Vulnerabilities
8814| [34552] Apache ActiveMQ Web Console Multiple Unspecified HTML Injection Vulnerabilities
8815| [34412] Apache Tomcat mod_jk Content Length Information Disclosure Vulnerability
8816| [34399] Apache Struts Unspecified Cross Site Scripting Vulnerability
8817| [34383] Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vulnerability
8818| [33913] Apache Tomcat POST Data Information Disclosure Vulnerability
8819| [33360] Apache Jackrabbit 'q' Parameter Multiple Cross Site Scripting Vulnerabilities
8820| [33110] Apache Roller 'q' Parameter Cross Site Scripting Vulnerability
8821| [32657] Novell NetWare ApacheAdmin Security Bypass Vulnerability
8822| [31805] Apache HTTP Server OS Fingerprinting Unspecified Security Vulnerability
8823| [31761] Oracle WebLogic Server Apache Connector Stack Based Buffer Overflow Vulnerability
8824| [31698] Apache Tomcat 'RemoteFilterValve' Security Bypass Vulnerability
8825| [31165] Kolab Groupware Server Apache Log File User Password Information Disclosure Vulnerability
8826| [30560] Apache 'mod_proxy_ftp' Wildcard Characters Cross-Site Scripting Vulnerability
8827| [30496] Apache Tomcat 'HttpServletResponse.sendError()' Cross Site Scripting Vulnerability
8828| [30494] Apache Tomcat 'RequestDispatcher' Information Disclosure Vulnerability
8829| [29653] Apache 'mod_proxy_http' Interim Response Denial of Service Vulnerability
8830| [29502] Apache Tomcat Host Manager Cross Site Scripting Vulnerability
8831| [28576] Apache-SSL Environment Variable Information Disclosure and Privilege Escalation Vulnerability
8832| [28484] Apache Tomcat Requests Containing MS-DOS Device Names Information Disclosure Vulnerability
8833| [28483] Apache Tomcat 'allowLinking' Accepts NULL Byte in URI Information Disclosure Vulnerability
8834| [28482] Apache Tomcat SSL Anonymous Cipher Configuration Information Disclosure Vulnerability
8835| [28481] Apache Tomcat Cross-Site Scripting Vulnerability
8836| [28477] Apache Tomcat AJP Connector Information Disclosure Vulnerability
8837| [27752] Apache mod_jk2 Host Header Multiple Stack Based Buffer Overflow Vulnerabilities
8838| [27706] Apache Tomcat Cookie Quote Handling Remote Information Disclosure Vulnerability
8839| [27703] Apache Tomcat Parameter Processing Remote Information Disclosure Vulnerability
8840| [27409] Apache 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
8841| [27365] Apache Tomcat SingleSignOn Remote Information Disclosure Vulnerability
8842| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
8843| [27236] Apache 'mod_proxy_balancer' Multiple Vulnerabilities
8844| [27234] Apache 'mod_proxy_ftp' Undefined Charset UTF-7 Cross-Site Scripting Vulnerability
8845| [27006] Apache Tomcat JULI Logging Component Default Security Policy Vulnerability
8846| [26939] Apache HTTP Server Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
8847| [26838] Apache mod_imagemap and mod_imap Cross-Site Scripting Vulnerability
8848| [26762] Apache::AuthCAS Cookie SQL Injection Vulnerability
8849| [26663] Apache HTTP Server 413 Error HTTP Request Method Cross-Site Scripting Weakness
8850| [26287] Apache Geronimo SQLLoginModule Authentication Bypass Vulnerability
8851| [26070] Apache Tomcat WebDav Remote Information Disclosure Vulnerability
8852| [25804] Apache Geronimo Management EJB Security Bypass Vulnerability
8853| [25653] Apache Mod_AutoIndex.C Undefined Charset Cross-Site Scripting Vulnerability
8854| [25531] Apache Tomcat Cal2.JSP Cross-Site Scripting Vulnerability
8855| [25489] Apache HTTP Server Mod_Proxy Denial of Service Vulnerability
8856| [25316] Apache Tomcat Multiple Remote Information Disclosure Vulnerabilities
8857| [25314] Apache Tomcat Host Manager Servlet Cross Site Scripting Vulnerability
8858| [25174] Apache Tomcat Error Message Reporting Cross Site Scripting Vulnerability
8859| [24999] Apache Tomcat SendMailServlet Cross-Site Scripting Vulnerability
8860| [24759] MySQLDumper Apache Access Control Authentication Bypass Vulnerability
8861| [24649] Apache HTTP Server Mod_Cache Denial of Service Vulnerability
8862| [24645] Apache HTTP Server Mod_Status Cross-Site Scripting Vulnerability
8863| [24553] Apache Mod_Mem_Cache Information Disclosure Vulnerability
8864| [24524] Apache Tomcat Accept-Language Cross Site Scripting Vulnerability
8865| [24480] Apache MyFaces Tomahawk JSF Framework Autoscroll Parameter Cross Site Scripting Vulnerability
8866| [24476] Apache Tomcat JSP Example Web Applications Cross Site Scripting Vulnerability
8867| [24475] Apache Tomcat Manager and Host Manager Upload Script Cross-Site Scripting Vulnerability
8868| [24215] Apache HTTP Server Worker Process Multiple Denial of Service Vulnerabilities
8869| [24147] Apache Tomcat JK Connector Double Encoding Security Bypass Vulnerability
8870| [24058] Apache Tomcat Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities
8871| [23687] Apache AXIS Non-Existent WSDL Path Information Disclosure Vulnerability
8872| [23438] Apache HTTPD suEXEC Local Multiple Privilege Escalation Weaknesses
8873| [22960] Apache HTTP Server Tomcat Directory Traversal Vulnerability
8874| [22849] Apache mod_python Output Filter Mode Information Disclosure Vulnerability
8875| [22791] Apache Tomcat Mod_JK.SO Arbitrary Code Execution Vulnerability
8876| [22732] Debian Apache Root Shell Local Privilege Escalation Vulnerabilities
8877| [22388] Apache Stats Extract Function Multiple Input Validation Vulnerabilities
8878| [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
8879| [21214] Apache Mod_Auth_Kerb Off-By-One Denial of Service Vulnerability
8880| [20527] Apache Mod_TCL Remote Format String Vulnerability
8881| [19661] Apache HTTP Server Arbitrary HTTP Request Headers Security Weakness
8882| [19447] Apache CGI Script Source Code Information Disclosure Vulnerability
8883| [19204] Apache Mod_Rewrite Off-By-One Buffer Overflow Vulnerability
8884| [19106] Apache Tomcat Information Disclosure Vulnerability
8885| [18138] Apache James SMTP Denial Of Service Vulnerability
8886| [17342] Apache Struts Multiple Remote Vulnerabilities
8887| [17095] Apache Log4Net Denial Of Service Vulnerability
8888| [16916] Apache mod_python FileSession Code Execution Vulnerability
8889| [16710] Apache Libapreq2 Quadratic Behavior Denial of Service Vulnerability
8890| [16260] Apache Geronimo Multiple Input Validation Vulnerabilities
8891| [16153] Apache mod_auth_pgsql Multiple Format String Vulnerabilities
8892| [16152] Apache Mod_SSL Custom Error Document Remote Denial Of Service Vulnerability
8893| [15834] Apache 'mod_imap' Referer Cross-Site Scripting Vulnerability
8894| [15765] Apache James Spooler Memory Leak Denial Of Service Vulnerability
8895| [15762] Apache MPM Worker.C Denial Of Service Vulnerability
8896| [15512] Apache Struts Error Response Cross-Site Scripting Vulnerability
8897| [15413] PHP Apache 2 Virtual() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability
8898| [15325] Apache Tomcat Simultaneous Directory Listing Denial Of Service Vulnerability
8899| [15224] Apache Mod_Auth_Shadow Authentication Bypass Vulnerability
8900| [15177] PHP Apache 2 Local Denial of Service Vulnerability
8901| [14982] ApacheTop Insecure Temporary File Creation Vulnerability
8902| [14721] Apache Mod_SSL SSLVerifyClient Restriction Bypass Vulnerability
8903| [14660] Apache CGI Byterange Request Denial of Service Vulnerability
8904| [14366] Apache mod_ssl CRL Handling Off-By-One Buffer Overflow Vulnerability
8905| [14106] Apache HTTP Request Smuggling Vulnerability
8906| [13778] Apache HTPasswd Password Command Line Argument Buffer Overflow Vulnerability
8907| [13777] Apache HTPasswd User Command Line Argument Buffer Overflow Vulnerability
8908| [13756] Apache Tomcat Java Security Manager Bypass Vulnerability
8909| [13537] Apache HTDigest Realm Command Line Argument Buffer Overflow Vulnerability
8910| [12877] Apache mod_ssl ssl_io_filter_cleanup Remote Denial Of Service Vulnerability
8911| [12795] Apache Tomcat Remote Malformed Request Denial Of Service Vulnerability
8912| [12619] Apache Software Foundation Batik Squiggle Browser Access Validation Vulnerability
8913| [12519] Apache mod_python Module Publisher Handler Information Disclosure Vulnerability
8914| [12308] Apache Utilities Insecure Temporary File Creation Vulnerability
8915| [12217] Apache mod_auth_radius Malformed RADIUS Server Reply Integer Overflow Vulnerability
8916| [12181] Mod_DOSEvasive Apache Module Local Insecure Temporary File Creation Vulnerability
8917| [11803] Apache Jakarta Results.JSP Remote Cross-Site Scripting Vulnerability
8918| [11471] Apache mod_include Local Buffer Overflow Vulnerability
8919| [11360] Apache mod_ssl SSLCipherSuite Restriction Bypass Vulnerability
8920| [11239] Apache Satisfy Directive Access Control Bypass Vulnerability
8921| [11187] Apache Web Server Remote IPv6 Buffer Overflow Vulnerability
8922| [11185] Apache Mod_DAV LOCK Denial Of Service Vulnerability
8923| [11182] Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability
8924| [11154] Apache mod_ssl Remote Denial of Service Vulnerability
8925| [11094] Apache mod_ssl Denial Of Service Vulnerability
8926| [10789] Apache mod_userdir Module Information Disclosure Vulnerability
8927| [10736] Apache 'mod_ssl' Log Function Format String Vulnerability
8928| [10619] Apache ap_escape_html Memory Allocation Denial Of Service Vulnerability
8929| [10508] Apache Mod_Proxy Remote Negative Content-Length Buffer Overflow Vulnerability
8930| [10478] ClueCentral Apache Suexec Patch Security Weakness
8931| [10355] Apache 'mod_ssl' 'ssl_util_uuencode_binary()' Stack Buffer Overflow Vulnerability
8932| [10212] Apache mod_auth Malformed Password Potential Memory Corruption Vulnerability
8933| [9933] Apache mod_disk_cache Module Client Authentication Credential Storage Weakness
8934| [9930] Apache Error and Access Logs Escape Sequence Injection Vulnerability
8935| [9921] Apache Connection Blocking Denial Of Service Vulnerability
8936| [9885] Apache Mod_Security Module SecFilterScanPost Off-By-One Buffer Overflow Vulnerability
8937| [9874] Apache HTAccess LIMIT Directive Bypass Configuration Error Weakness
8938| [9829] Apache Mod_Access Access Control Rule Bypass Vulnerability
8939| [9826] Apache Mod_SSL HTTP Request Remote Denial Of Service Vulnerability
8940| [9733] Apache Cygwin Directory Traversal Vulnerability
8941| [9599] Apache mod_php Global Variables Information Disclosure Weakness
8942| [9590] Apache-SSL Client Certificate Forging Vulnerability
8943| [9571] Apache mod_digest Client-Supplied Nonce Verification Vulnerability
8944| [9471] Apache mod_perl Module File Descriptor Leakage Vulnerability
8945| [9404] Mod-Auth-Shadow Apache Module Expired User Credential Weakness
8946| [9302] Apache mod_php Module File Descriptor Leakage Vulnerability
8947| [9129] Apache mod_python Module Malformed Query Denial of Service Vulnerability
8948| [8926] Apache Web Server mod_cgid Module CGI Data Redirection Vulnerability
8949| [8919] Apache Mod_Security Module Heap Corruption Vulnerability
8950| [8911] Apache Web Server Multiple Module Local Buffer Overflow Vulnerability
8951| [8898] Red Hat Apache Directory Index Default Configuration Error
8952| [8883] Apache Cocoon Directory Traversal Vulnerability
8953| [8824] Apache Tomcat Non-HTTP Request Denial Of Service Vulnerability
8954| [8822] Apache Mod_Throttle Module Local Shared Memory Corruption Vulnerability
8955| [8725] Apache2 MOD_CGI STDERR Denial Of Service Vulnerability
8956| [8707] Apache htpasswd Password Entropy Weakness
8957| [8561] Apache::Gallery Insecure Local File Storage Privilege Escalation Vulnerability
8958| [8287] Mod_Mylo Apache Module REQSTR Buffer Overflow Vulnerability
8959| [8226] Apache HTTP Server Multiple Vulnerabilities
8960| [8138] Apache Web Server Type-Map Recursive Loop Denial Of Service Vulnerability
8961| [8137] Apache Web Server Prefork MPM Denial Of Service Vulnerability
8962| [8136] Macromedia Apache Web Server Encoded Space Source Disclosure Vulnerability
8963| [8135] Apache Web Server FTP Proxy IPV6 Denial Of Service Vulnerability
8964| [8134] Apache Web Server SSLCipherSuite Weak CipherSuite Renegotiation Weakness
8965| [7768] Apache Tomcat Insecure Directory Permissions Vulnerability
8966| [7725] Apache Basic Authentication Module Valid User Login Denial Of Service Vulnerability
8967| [7723] Apache APR_PSPrintf Memory Corruption Vulnerability
8968| [7448] Apache Mod_Auth_Any Remote Command Execution Vulnerability
8969| [7375] Apache Mod_Access_Referer NULL Pointer Dereference Denial of Service Vulnerability
8970| [7332] Apache Web Server OS2 Filestat Denial Of Service Vulnerability
8971| [7255] Apache Web Server File Descriptor Leakage Vulnerability
8972| [7254] Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability
8973| [6943] Apache Web Server MIME Boundary Information Disclosure Vulnerability
8974| [6939] Apache Web Server ETag Header Information Disclosure Weakness
8975| [6722] Apache Tomcat Web.XML File Contents Disclosure Vulnerability
8976| [6721] Apache Tomcat Null Byte Directory/File Disclosure Vulnerability
8977| [6720] Apache Tomcat Example Web Application Cross Site Scripting Vulnerability
8978| [6662] Apache Web Server MS-DOS Device Name Denial Of Service Vulnerability
8979| [6661] Apache Web Server Default Script Mapping Bypass Vulnerability
8980| [6660] Apache Web Server Illegal Character HTTP Request File Disclosure Vulnerability
8981| [6659] Apache Web Server MS-DOS Device Name Arbitrary Code Execution Vulnerability
8982| [6562] Apache Tomcat Invoker Servlet File Disclosure Vulnerability
8983| [6320] Apache/Tomcat Mod_JK Chunked Encoding Denial Of Service Vulnerability
8984| [6117] Apache mod_php File Descriptor Leakage Vulnerability
8985| [6065] Apache 2 WebDAV CGI POST Request Information Disclosure Vulnerability
8986| [5996] Apache AB.C Web Benchmarking Buffer Overflow Vulnerability
8987| [5995] Apache AB.C Web Benchmarking Read_Connection() Buffer Overflow Vulnerability
8988| [5993] Multiple Apache HTDigest Buffer Overflow Vulnerabilities
8989| [5992] Apache HTDigest Insecure Temporary File Vulnerability
8990| [5991] Apache HTDigest Arbitrary Command Execution Vulnerability
8991| [5990] Apache HTPasswd Insecure Temporary File Vulnerability
8992| [5981] Multiple Apache HTDigest and HTPassWD Component Vulnerabilites
8993| [5884] Apache Web Server Scoreboard Memory Segment Overwriting SIGUSR1 Sending Vulnerability
8994| [5847] Apache Server Side Include Cross Site Scripting Vulnerability
8995| [5838] Apache Tomcat 3.2 Directory Disclosure Vulnerability
8996| [5816] Apache 2 mod_dav Denial Of Service Vulnerability
8997| [5791] HP VirtualVault Apache mod_ssl Denial Of Service Vulnerability
8998| [5787] Apache Oversized STDERR Buffer Denial Of Service Vulnerability
8999| [5786] Apache Tomcat DefaultServlet File Disclosure Vulnerability
9000| [5542] Apache Tomcat 4.1 JSP Request Cross Site Scripting Vulnerability
9001| [5486] Apache 2.0 CGI Path Disclosure Vulnerability
9002| [5485] Apache 2.0 Path Disclosure Vulnerability
9003| [5434] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
9004| [5256] Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
9005| [5194] Apache Tomcat DOS Device Name Cross Site Scripting Vulnerability
9006| [5193] Apache Tomcat Servlet Mapping Cross Site Scripting Vulnerability
9007| [5067] Apache Tomcat Null Character Malformed Request Denial Of Service Vulnerability
9008| [5054] Apache Tomcat Web Root Path Disclosure Vulnerability
9009| [5033] Apache Chunked-Encoding Memory Corruption Vulnerability
9010| [4995] Apache Tomcat JSP Engine Denial of Service Vulnerability
9011| [4878] Apache Tomcat RealPath.JSP Malformed Request Information Disclosure Vulnerability
9012| [4877] Apache Tomcat Example Files Web Root Path Disclosure Vulnerability
9013| [4876] Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability
9014| [4575] Apache Tomcat Servlet Path Disclosure Vulnerability
9015| [4557] Apache Tomcat System Path Information Disclosure Vulnerability
9016| [4437] Apache Error Message Cross-Site Scripting Vulnerability
9017| [4431] Apache PrintEnv/Test_CGI Script Injection Vulnerability
9018| [4358] Apache Double-Reverse Lookup Log Entry Spoofing Vulnerability
9019| [4335] Apache Win32 Batch File Remote Command Execution Vulnerability
9020| [4292] Oracle 9iAS Apache PL/SQL Module Web Administration Access Vulnerability
9021| [4189] Apache mod_ssl/Apache-SSL Buffer Overflow Vulnerability
9022| [4057] Apache 2 for Windows OPTIONS request Path Disclosure Vulnerability
9023| [4056] Apache 2 for Windows php.exe Path Disclosure Vulnerability
9024| [4037] Oracle 9iAS Apache PL/SQL Module Denial of Service Vulnerability
9025| [4032] Oracle 9iAS Apache PL/SQL Module Multiple Buffer Overflows Vulnerability
9026| [3796] Apache HTTP Request Unexpected Behavior Vulnerability
9027| [3790] Apache Non-Existent Log Directory Denial Of Service Vulnerability
9028| [3786] Apache Win32 PHP.EXE Remote File Disclosure Vulnerability
9029| [3727] Oracle 9I Application Server PL/SQL Apache Module Directory Traversal Vulnerability
9030| [3726] Oracle 9I Application Server PL/SQL Apache Module Buffer Overflow Vulnerability
9031| [3596] Apache Split-Logfile File Append Vulnerability
9032| [3521] Apache mod_usertrack Predictable ID Generation Vulnerability
9033| [3335] Red Hat Linux Apache Remote Username Enumeration Vulnerability
9034| [3316] MacOS X Client Apache Directory Contents Disclosure Vulnerability
9035| [3256] Apache mod_auth_oracle Remote SQL Query Manipulation Vulnerability
9036| [3255] Apache mod_auth_mysql Remote SQL Query Manipulation Vulnerability
9037| [3254] Apache AuthPG Remote SQL Query Manipulation Vulnerability
9038| [3253] Apache mod_auth_pgsql_sys Remote SQL Query Manipulation Vulnerability
9039| [3251] Apache mod_auth_pgsql Remote SQL Query Manipulation Vulnerability
9040| [3176] Apache Mod ReWrite Rules Bypassing Image Linking Vulnerability
9041| [3169] Apache Server Address Disclosure Vulnerability
9042| [3009] Apache Possible Directory Index Disclosure Vulnerability
9043| [2982] Apache Tomcat Cross-Site Scripting Vulnerability
9044| [2852] MacOS X Client Apache File Protection Bypass Vulnerability
9045| [2740] Apache Web Server HTTP Request Denial of Service Vulnerability
9046| [2518] Apache Tomcat 3.0 Directory Traversal Vulnerability
9047| [2503] Apache Artificially Long Slash Path Directory Listing Vulnerability
9048| [2300] NCSA/Apache httpd ScriptAlias Source Retrieval Vulnerability
9049| [2216] Apache Web Server DoS Vulnerability
9050| [2182] Apache /tmp File Race Vulnerability
9051| [2171] Oracle Apache+WebDB Documented Backdoor Vulnerability
9052| [2060] Apache Web Server with Php 3 File Disclosure Vulnerability
9053| [1821] Apache mod_cookies Buffer Overflow Vulnerability
9054| [1728] Apache Rewrite Module Arbitrary File Disclosure Vulnerability
9055| [1658] SuSE Apache CGI Source Code Viewing Vulnerability
9056| [1656] SuSE Apache WebDAV Directory Listings Vulnerability
9057| [1575] Trustix Apache-SSL RPM Permissions Vulnerability
9058| [1548] Apache Jakarta-Tomcat /admin Context Vulnerability
9059| [1532] Apache Tomcat Snoop Servlet Information Disclosure Vulnerability
9060| [1531] Apache Tomcat 3.1 Path Revealing Vulnerability
9061| [1457] Apache::ASP source.asp Example Script Vulnerability
9062| [1284] Apache HTTP Server (win32) Root Directory Access Vulnerability
9063| [1083] Cobalt Raq Apache .htaccess Disclosure Vulnerability
9064|
9065| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9066| [86258] Apache CloudStack text fields cross-site scripting
9067| [85983] Apache Subversion mod_dav_svn module denial of service
9068| [85875] Apache OFBiz UEL code execution
9069| [85874] Apache OFBiz Webtools View Log screen cross-site scripting
9070| [85871] Apache HTTP Server mod_session_dbd unspecified
9071| [85756] Apache Struts OGNL expression command execution
9072| [85755] Apache Struts DefaultActionMapper class open redirect
9073| [85586] Apache ActiveMQ CVE-2013-1879 cross-site scripting
9074| [85574] Apache HTTP Server mod_dav denial of service
9075| [85573] Apache Struts Showcase App OGNL code execution
9076| [85496] Apache CXF denial of service
9077| [85423] Apache Geronimo RMI classloader code execution
9078| [85326] Apache Santuario XML Security for C++ buffer overflow
9079| [85323] Apache Santuario XML Security for Java spoofing
9080| [85319] Apache Qpid Python client SSL spoofing
9081| [85019] Apache Santuario XML Security for C++ CVE-2013-2156 buffer overflow
9082| [85018] Apache Santuario XML Security for C++ CVE-2013-2155 denial of service
9083| [85017] Apache Santuario XML Security for C++ CVE-2013-2154 buffer overflow
9084| [85016] Apache Santuario XML Security for C++ CVE-2013-2153 spoofing
9085| [84952] Apache Tomcat CVE-2012-3544 denial of service
9086| [84763] Apache Struts CVE-2013-2135 security bypass
9087| [84762] Apache Struts CVE-2013-2134 security bypass
9088| [84719] Apache Subversion CVE-2013-2088 command execution
9089| [84718] Apache Subversion CVE-2013-2112 denial of service
9090| [84717] Apache Subversion CVE-2013-1968 denial of service
9091| [84577] Apache Tomcat security bypass
9092| [84576] Apache Tomcat symlink
9093| [84543] Apache Struts CVE-2013-2115 security bypass
9094| [84542] Apache Struts CVE-2013-1966 security bypass
9095| [84154] Apache Tomcat session hijacking
9096| [84144] Apache Tomcat denial of service
9097| [84143] Apache Tomcat information disclosure
9098| [84111] Apache HTTP Server command execution
9099| [84043] Apache Virtual Computing Lab cross-site scripting
9100| [84042] Apache Virtual Computing Lab cross-site scripting
9101| [83782] Apache CloudStack information disclosure
9102| [83781] Apache CloudStack security bypass
9103| [83720] Apache ActiveMQ cross-site scripting
9104| [83719] Apache ActiveMQ denial of service
9105| [83718] Apache ActiveMQ denial of service
9106| [83263] Apache Subversion denial of service
9107| [83262] Apache Subversion denial of service
9108| [83261] Apache Subversion denial of service
9109| [83259] Apache Subversion denial of service
9110| [83035] Apache mod_ruid2 security bypass
9111| [82852] Apache Qpid federation_tag security bypass
9112| [82851] Apache Qpid qpid::framing::Buffer denial of service
9113| [82758] Apache Rave User RPC API information disclosure
9114| [82663] Apache Subversion svn_fs_file_length() denial of service
9115| [82642] Apache Qpid qpid::framing::Buffer::checkAvailable() denial of service
9116| [82641] Apache Qpid AMQP denial of service
9117| [82626] Apache HTTP Server on Debian GNU/Linux Debian apache2ctl symlink
9118| [82618] Apache Commons FileUpload symlink
9119| [82360] Apache HTTP Server manager interface cross-site scripting
9120| [82359] Apache HTTP Server hostnames cross-site scripting
9121| [82338] Apache Tomcat log/logdir information disclosure
9122| [82328] Apache Maven and Apache Maven Wagon SSL spoofing
9123| [82268] Apache OpenJPA deserialization command execution
9124| [81981] Apache CXF UsernameTokens security bypass
9125| [81980] Apache CXF WS-Security security bypass
9126| [81398] Apache OFBiz cross-site scripting
9127| [81240] Apache CouchDB directory traversal
9128| [81226] Apache CouchDB JSONP code execution
9129| [81225] Apache CouchDB Futon user interface cross-site scripting
9130| [81211] Apache Axis2/C SSL spoofing
9131| [81167] Apache CloudStack DeployVM information disclosure
9132| [81166] Apache CloudStack AddHost API information disclosure
9133| [81165] Apache CloudStack createSSHKeyPair API information disclosure
9134| [80518] Apache Tomcat cross-site request forgery security bypass
9135| [80517] Apache Tomcat FormAuthenticator security bypass
9136| [80516] Apache Tomcat NIO denial of service
9137| [80408] Apache Tomcat replay-countermeasure security bypass
9138| [80407] Apache Tomcat HTTP Digest Access Authentication security bypass
9139| [80317] Apache Tomcat slowloris denial of service
9140| [79984] Apache Commons HttpClient SSL spoofing
9141| [79983] Apache CXF SSL spoofing
9142| [79830] Apache Axis2/Java SSL spoofing
9143| [79829] Apache Axis SSL spoofing
9144| [79809] Apache Tomcat DIGEST security bypass
9145| [79806] Apache Tomcat parseHeaders() denial of service
9146| [79540] Apache OFBiz unspecified
9147| [79487] Apache Axis2 SAML security bypass
9148| [79212] Apache Cloudstack code execution
9149| [78734] Apache CXF SOAP Action security bypass
9150| [78730] Apache Qpid broker denial of service
9151| [78617] Eucalyptus Apache Santuario (XML Security for Java) denial of service
9152| [78563] Apache mod_pagespeed module unspecified cross-site scripting
9153| [78562] Apache mod_pagespeed module security bypass
9154| [78454] Apache Axis2 security bypass
9155| [78452] Websense Web Security and Web Filter Apache Tomcat information disclosure
9156| [78451] Websense Web Security and Web Filter Apache Tomcat cross-site scripting
9157| [78321] Apache Wicket unspecified cross-site scripting
9158| [78183] Apache Struts parameters denial of service
9159| [78182] Apache Struts cross-site request forgery
9160| [78153] Apache Solr Autocomplete module for Drupal autocomplete results cross-site scripting
9161| [77987] mod_rpaf module for Apache denial of service
9162| [77958] Apache Struts skill name code execution
9163| [77914] Apache HTTP Server mod_negotiation module cross-site scripting
9164| [77913] Apache HTTP Server mod_proxy_ajp information disclosure
9165| [77568] Apache Qpid broker security bypass
9166| [77421] Apache Libcloud spoofing
9167| [77059] Oracle Solaris Cluster Apache Tomcat Agent unspecified
9168| [77046] Oracle Solaris Apache HTTP Server information disclosure
9169| [76837] Apache Hadoop information disclosure
9170| [76802] Apache Sling CopyFrom denial of service
9171| [76692] Apache Hadoop symlink
9172| [76535] Apache Roller console cross-site request forgery
9173| [76534] Apache Roller weblog cross-site scripting
9174| [76152] Apache CXF elements security bypass
9175| [76151] Apache CXF child policies security bypass
9176| [75983] MapServer for Windows Apache file include
9177| [75857] Apache Commons Compress and Apache Ant bzip2 denial of service
9178| [75558] Apache POI denial of service
9179| [75545] PHP apache_request_headers() buffer overflow
9180| [75302] Apache Qpid SASL security bypass
9181| [75211] Debian GNU/Linux apache 2 cross-site scripting
9182| [74901] Apache HTTP Server LD_LIBRARY_PATH privilege escalation
9183| [74871] Apache OFBiz FlexibleStringExpander code execution
9184| [74870] Apache OFBiz multiple cross-site scripting
9185| [74750] Apache Hadoop unspecified spoofing
9186| [74319] Apache Struts XSLTResult.java file upload
9187| [74313] Apache Traffic Server header buffer overflow
9188| [74276] Apache Wicket directory traversal
9189| [74273] Apache Wicket unspecified cross-site scripting
9190| [74181] Apache HTTP Server mod_fcgid module denial of service
9191| [73690] Apache Struts OGNL code execution
9192| [73432] Apache Solr extension for TYPO3 unspecified cross-site scripting
9193| [73100] Apache MyFaces in directory traversal
9194| [73096] Apache APR hash denial of service
9195| [73052] Apache Struts name cross-site scripting
9196| [73030] Apache CXF UsernameToken security bypass
9197| [72888] Apache Struts lastName cross-site scripting
9198| [72758] Apache HTTP Server httpOnly information disclosure
9199| [72757] Apache HTTP Server MPM denial of service
9200| [72585] Apache Struts ParameterInterceptor security bypass
9201| [72438] Apache Tomcat Digest security bypass
9202| [72437] Apache Tomcat Digest security bypass
9203| [72436] Apache Tomcat DIGEST security bypass
9204| [72425] Apache Tomcat parameter denial of service
9205| [72422] Apache Tomcat request object information disclosure
9206| [72377] Apache HTTP Server scoreboard security bypass
9207| [72345] Apache HTTP Server HTTP request denial of service
9208| [72229] Apache Struts ExceptionDelegator command execution
9209| [72089] Apache Struts ParameterInterceptor directory traversal
9210| [72088] Apache Struts CookieInterceptor command execution
9211| [72047] Apache Geronimo hash denial of service
9212| [72016] Apache Tomcat hash denial of service
9213| [71711] Apache Struts OGNL expression code execution
9214| [71654] Apache Struts interfaces security bypass
9215| [71620] Apache ActiveMQ failover denial of service
9216| [71617] Apache HTTP Server mod_proxy module information disclosure
9217| [71508] Apache MyFaces EL security bypass
9218| [71445] Apache HTTP Server mod_proxy security bypass
9219| [71203] Apache Tomcat servlets privilege escalation
9220| [71181] Apache HTTP Server ap_pregsub() denial of service
9221| [71093] Apache HTTP Server ap_pregsub() buffer overflow
9222| [70336] Apache HTTP Server mod_proxy information disclosure
9223| [69804] Apache HTTP Server mod_proxy_ajp denial of service
9224| [69472] Apache Tomcat AJP security bypass
9225| [69396] Apache HTTP Server ByteRange filter denial of service
9226| [69394] Apache Wicket multi window support cross-site scripting
9227| [69176] Apache Tomcat XML information disclosure
9228| [69161] Apache Tomcat jsvc information disclosure
9229| [68799] mod_authnz_external module for Apache mysql-auth.pl SQL injection
9230| [68541] Apache Tomcat sendfile information disclosure
9231| [68420] Apache XML Security denial of service
9232| [68238] Apache Tomcat JMX information disclosure
9233| [67860] Apache Rampart/C rampart_timestamp_token_validate security bypass
9234| [67804] Apache Subversion control rules information disclosure
9235| [67803] Apache Subversion control rules denial of service
9236| [67802] Apache Subversion baselined denial of service
9237| [67672] Apache Archiva multiple cross-site scripting
9238| [67671] Apache Archiva multiple cross-site request forgery
9239| [67564] Apache APR apr_fnmatch() denial of service
9240| [67532] IBM WebSphere Application Server org.apache.jasper.runtime.JspWriterImpl.response denial of service
9241| [67515] Apache Tomcat annotations security bypass
9242| [67480] Apache Struts s:submit information disclosure
9243| [67414] Apache APR apr_fnmatch() denial of service
9244| [67356] Apache Struts javatemplates cross-site scripting
9245| [67354] Apache Struts Xwork cross-site scripting
9246| [66676] Apache Tomcat HTTP BIO information disclosure
9247| [66675] Apache Tomcat web.xml security bypass
9248| [66640] Apache HttpComponents HttpClient Proxy-Authorization information disclosure
9249| [66241] Apache HttpComponents information disclosure
9250| [66154] Apache Tomcat ServletSecurity security bypass
9251| [65971] Apache Tomcat ServletSecurity security bypass
9252| [65876] Apache Subversion mod_dav_svn denial of service
9253| [65343] Apache Continuum unspecified cross-site scripting
9254| [65162] Apache Tomcat NIO connector denial of service
9255| [65161] Apache Tomcat javax.servlet.ServletRequest.getLocale() denial of service
9256| [65160] Apache Tomcat HTML Manager interface cross-site scripting
9257| [65159] Apache Tomcat ServletContect security bypass
9258| [65050] Apache CouchDB web-based administration UI cross-site scripting
9259| [64773] Oracle HTTP Server Apache Plugin unauthorized access
9260| [64473] Apache Subversion blame -g denial of service
9261| [64472] Apache Subversion walk() denial of service
9262| [64407] Apache Axis2 CVE-2010-0219 code execution
9263| [63926] Apache Archiva password privilege escalation
9264| [63785] Apache CouchDB LD_LIBRARY_PATH privilege escalation
9265| [63493] Apache Archiva credentials cross-site request forgery
9266| [63477] Apache Tomcat HttpOnly session hijacking
9267| [63422] Apache Tomcat sessionsList.jsp cross-site scripting
9268| [63303] Apache mod_fcgid module fcgid_header_bucket_read() buffer overflow
9269| [62959] Apache Shiro filters security bypass
9270| [62790] Apache Perl cgi module denial of service
9271| [62576] Apache Qpid exchange denial of service
9272| [62575] Apache Qpid AMQP denial of service
9273| [62354] Apache Qpid SSL denial of service
9274| [62235] Apache APR-util apr_brigade_split_line() denial of service
9275| [62181] Apache XML-RPC SAX Parser information disclosure
9276| [61721] Apache Traffic Server cache poisoning
9277| [61202] Apache Derby BUILTIN authentication functionality information disclosure
9278| [61186] Apache CouchDB Futon cross-site request forgery
9279| [61169] Apache CXF DTD denial of service
9280| [61070] Apache Jackrabbit search.jsp SQL injection
9281| [61006] Apache SLMS Quoting cross-site request forgery
9282| [60962] Apache Tomcat time cross-site scripting
9283| [60883] Apache mod_proxy_http information disclosure
9284| [60671] Apache HTTP Server mod_cache and mod_dav denial of service
9285| [60264] Apache Tomcat Transfer-Encoding denial of service
9286| [59746] Apache Axis2 axis2/axis2-admin page session hijacking
9287| [59588] Apache Axis2/Java XML DTD (Document Type Declaration) data denial of service
9288| [59413] Apache mod_proxy_http timeout information disclosure
9289| [59058] Apache MyFaces unencrypted view state cross-site scripting
9290| [58827] Apache Axis2 xsd file include
9291| [58790] Apache Axis2 modules cross-site scripting
9292| [58299] Apache ActiveMQ queueBrowse cross-site scripting
9293| [58169] Apache Tomcat Web Application Manager / Host Manager cross-site request forgery
9294| [58056] Apache ActiveMQ .jsp source code disclosure
9295| [58055] Apache Tomcat realm name information disclosure
9296| [58046] Apache HTTP Server mod_auth_shadow security bypass
9297| [57841] Apache Open For Business Project (OFBiz) subject cross-site scripting
9298| [57840] Apache Open For Business Project (OFBiz) multiple parameters cross-site scripting
9299| [57429] Apache CouchDB algorithms information disclosure
9300| [57398] Apache ActiveMQ Web console cross-site request forgery
9301| [57397] Apache ActiveMQ createDestination.action cross-site scripting
9302| [56653] Apache HTTP Server DNS spoofing
9303| [56652] Apache HTTP Server DNS cross-site scripting
9304| [56625] Apache HTTP Server request header information disclosure
9305| [56624] Apache HTTP Server mod_isapi orphaned callback pointer code execution
9306| [56623] Apache HTTP Server mod_proxy_ajp denial of service
9307| [55941] mod_proxy module for Apache ap_proxy_send_fb() buffer overflow
9308| [55857] Apache Tomcat WAR files directory traversal
9309| [55856] Apache Tomcat autoDeploy attribute security bypass
9310| [55855] Apache Tomcat WAR directory traversal
9311| [55210] Intuit component for Joomla! Apache information disclosure
9312| [54533] Apache Tomcat 404 error page cross-site scripting
9313| [54182] Apache Tomcat admin default password
9314| [53878] Apache Solr Search (solr) extension for TYPO3 unspecified cross-site scripting
9315| [53666] Apache HTTP Server Solaris pollset support denial of service
9316| [53650] Apache HTTP Server HTTP basic-auth module security bypass
9317| [53124] mod_proxy_ftp module for Apache HTTP header security bypass
9318| [53041] mod_proxy_ftp module for Apache denial of service
9319| [52540] Apache Portable Runtime and Apache Portable Utility library multiple buffer overflow
9320| [51953] Apache Tomcat Path Disclosure
9321| [51952] Apache Tomcat Path Traversal
9322| [51951] Apache stronghold-status Information Disclosure
9323| [51950] Apache stronghold-info Information Disclosure
9324| [51949] Apache PHP Source Code Disclosure
9325| [51948] Apache Multiviews Attack
9326| [51946] Apache JServ Environment Status Information Disclosure
9327| [51945] Apache error_log Information Disclosure
9328| [51944] Apache Default Installation Page Pattern Found
9329| [51943] Apache AXIS XML Parser echoheaders.jws Sample Web Service Denial of Service
9330| [51942] Apache AXIS XML External Entity File Retrieval
9331| [51941] Apache AXIS Sample Servlet Information Leak
9332| [51940] Apache access_log Information Disclosure
9333| [51626] Apache mod_deflate denial of service
9334| [51532] mod_proxy module for the Apache HTTP Server stream_reqbody_cl denial of service
9335| [51365] Apache Tomcat RequestDispatcher security bypass
9336| [51273] Apache HTTP Server Incomplete Request denial of service
9337| [51195] Apache Tomcat XML information disclosure
9338| [50994] Apache APR-util xml/apr_xml.c denial of service
9339| [50993] Apache APR-util apr_brigade_vprintf denial of service
9340| [50964] Apache APR-util apr_strmatch_precompile() denial of service
9341| [50930] Apache Tomcat j_security_check information disclosure
9342| [50928] Apache Tomcat AJP denial of service
9343| [50884] Apache HTTP Server XML ENTITY denial of service
9344| [50808] Apache HTTP Server AllowOverride privilege escalation
9345| [50108] Apache Struts s:a tag and s:url tag cross-site scripting
9346| [50059] Apache mod_proxy_ajp information disclosure
9347| [49951] Apache Tiles Expression Language (EL) expressions cross-site scripting
9348| [49925] Apache Geronimo Web Administrative Console cross-site request forgery
9349| [49924] Apache Geronimo console/portal/Server/Monitoring cross-site scripting
9350| [49921] Apache ActiveMQ Web interface cross-site scripting
9351| [49898] Apache Geronimo Services/Repository directory traversal
9352| [49725] Apache Tomcat mod_jk module information disclosure
9353| [49715] Apache mod_perl Apache::Status and Apache2::Status modules cross-site scripting
9354| [49712] Apache Struts unspecified cross-site scripting
9355| [49213] Apache Tomcat cal2.jsp cross-site scripting
9356| [48934] Apache Tomcat POST doRead method information disclosure
9357| [48211] Apache Tomcat header HTTP request smuggling
9358| [48163] libapache2-mod-auth-mysql module for Debian multibyte encoding SQL injection
9359| [48110] Apache Jackrabbit search.jsp and swr.jsp cross-site scripting
9360| [47709] Apache Roller "
9361| [47104] Novell Netware ApacheAdmin console security bypass
9362| [47086] Apache HTTP Server OS fingerprinting unspecified
9363| [46329] Apache Struts FilterDispatcher and DefaultStaticContentLoader class directory traversal
9364| [45791] Apache Tomcat RemoteFilterValve security bypass
9365| [44435] Oracle WebLogic Apache Connector buffer overflow
9366| [44411] Apache Tomcat allowLinking UTF-8 directory traversal
9367| [44223] Apache HTTP Server mod_proxy_ftp cross-site scripting
9368| [44156] Apache Tomcat RequestDispatcher directory traversal
9369| [44155] Apache Tomcat HttpServletResponse.sendError() cross-site scripting
9370| [43885] Oracle WebLogic Server Apache Connector buffer overflow
9371| [42987] Apache HTTP Server mod_proxy module denial of service
9372| [42915] Apache Tomcat JSP files path disclosure
9373| [42914] Apache Tomcat MS-DOS path disclosure
9374| [42892] Apache Tomcat unspecified unauthorized access
9375| [42816] Apache Tomcat Host Manager cross-site scripting
9376| [42303] Apache 403 error cross-site scripting
9377| [41618] Apache-SSL ExpandCert() authentication bypass
9378| [40761] Apache Derby RDBNAM parameter and DatabaseMetaData.getURL information disclosure
9379| [40736] Apache Tomcat HTTP/1.1 connector information disclosure
9380| [40614] Apache mod_jk2 HTTP Host header buffer overflow
9381| [40562] Apache Geronimo init information disclosure
9382| [40478] Novell Web Manager webadmin-apache.conf security bypass
9383| [40411] Apache Tomcat exception handling information disclosure
9384| [40409] Apache Tomcat native (APR based) connector weak security
9385| [40403] Apache Tomcat quotes and %5C cookie information disclosure
9386| [40388] Sun Java Plug-In org.apache.crimson.tree.XmlDocument security bypass
9387| [39893] Apache HTTP Server mod_negotiation HTTP response splitting
9388| [39867] Apache HTTP Server mod_negotiation cross-site scripting
9389| [39804] Apache Tomcat SingleSignOn information disclosure
9390| [39615] Apache HTTP Server mod_proxy_ftp.c UTF-7 cross-site scripting
9391| [39612] Apache HTTP Server mod_proxy_balancer buffer overflow
9392| [39608] Apache HTTP Server balancer manager cross-site request forgery
9393| [39476] Apache mod_proxy_balancer balancer_handler function denial of service
9394| [39474] Apache HTTP Server mod_proxy_balancer cross-site scripting
9395| [39472] Apache HTTP Server mod_status cross-site scripting
9396| [39201] Apache Tomcat JULI logging weak security
9397| [39158] Apache HTTP Server Windows SMB shares information disclosure
9398| [39001] Apache HTTP Server mod_imap and mod_imagemap module cross-site scripting
9399| [38951] Apache::AuthCAS Perl module cookie SQL injection
9400| [38800] Apache HTTP Server 413 error page cross-site scripting
9401| [38211] Apache Geronimo SQLLoginModule authentication bypass
9402| [37243] Apache Tomcat WebDAV directory traversal
9403| [37178] RHSA update for Apache HTTP Server mod_status module cross-site scripting not installed
9404| [37177] RHSA update for Apache HTTP Server Apache child process denial of service not installed
9405| [37119] RHSA update for Apache mod_auth_kerb off-by-one buffer overflow not installed
9406| [37100] RHSA update for Apache and IBM HTTP Server Expect header cross-site scripting not installed
9407| [36782] Apache Geronimo MEJB unauthorized access
9408| [36586] Apache HTTP Server UTF-7 cross-site scripting
9409| [36468] Apache Geronimo LoginModule security bypass
9410| [36467] Apache Tomcat functions.jsp cross-site scripting
9411| [36402] Apache Tomcat calendar cross-site request forgery
9412| [36354] Apache HTTP Server mod_proxy module denial of service
9413| [36352] Apache HTTP Server ap_proxy_date_canon() denial of service
9414| [36336] Apache Derby lock table privilege escalation
9415| [36335] Apache Derby schema privilege escalation
9416| [36006] Apache Tomcat "
9417| [36001] Apache Tomcat Host Manager Servlet alias cross-site scripting
9418| [35999] Apache Tomcat \"
9419| [35795] Apache Tomcat CookieExample cross-site scripting
9420| [35536] Apache Tomcat SendMailServlet example cross-site scripting
9421| [35384] Apache HTTP Server mod_cache module denial of service
9422| [35097] Apache HTTP Server mod_status module cross-site scripting
9423| [35095] Apache HTTP Server Prefork MPM module denial of service
9424| [34984] Apache HTTP Server recall_headers information disclosure
9425| [34966] Apache HTTP Server MPM content spoofing
9426| [34965] Apache HTTP Server MPM information disclosure
9427| [34963] Apache HTTP Server MPM multiple denial of service
9428| [34872] Apache MyFaces Tomahawk autoscroll parameter cross-site scripting
9429| [34869] Apache Tomcat JSP example Web application cross-site scripting
9430| [34868] Apache Tomcat Manager and Host Manager cross-site scripting
9431| [34496] Apache Tomcat JK Connector security bypass
9432| [34377] Apache Tomcat hello.jsp cross-site scripting
9433| [34212] Apache Tomcat SSL configuration security bypass
9434| [34210] Apache Tomcat Accept-Language cross-site scripting
9435| [34209] Apache Tomcat calendar application cross-site scripting
9436| [34207] Apache Tomcat implicit-objects.jsp cross-site scripting
9437| [34167] Apache Axis WSDL file path disclosure
9438| [34068] Apache Tomcat AJP connector information disclosure
9439| [33584] Apache HTTP Server suEXEC privilege escalation
9440| [32988] Apache Tomcat proxy module directory traversal
9441| [32794] Apache Tomcat JK Web Server Connector map_uri_to_worker() buffer overflow
9442| [32708] Debian Apache tty privilege escalation
9443| [32441] ApacheStats extract() PHP call unspecified
9444| [32128] Apache Tomcat default account
9445| [31680] Apache Tomcat RequestParamExample cross-site scripting
9446| [31649] Apache Tomcat Sample Servlet TroubleShooter detected
9447| [31557] BEA WebLogic Server and WebLogic Express Apache proxy plug-in denial of service
9448| [31236] Apache HTTP Server htpasswd.c strcpy buffer overflow
9449| [30456] Apache mod_auth_kerb off-by-one buffer overflow
9450| [29550] Apache mod_tcl set_var() format string
9451| [28620] Apache and IBM HTTP Server Expect header cross-site scripting
9452| [28357] Apache HTTP Server mod_alias script source information disclosure
9453| [28063] Apache mod_rewrite off-by-one buffer overflow
9454| [27902] Apache Tomcat URL information disclosure
9455| [26786] Apache James SMTP server denial of service
9456| [25680] libapache2 /tmp/svn file upload
9457| [25614] Apache Struts lookupMap cross-site scripting
9458| [25613] Apache Struts ActionForm denial of service
9459| [25612] Apache Struts isCancelled() security bypass
9460| [24965] Apache mod_python FileSession command execution
9461| [24716] Apache James spooler memory leak denial of service
9462| [24159] Apache Geronimo Web-Access-Log Viewer cross-site scripting
9463| [24158] Apache Geronimo jsp-examples cross-site scripting
9464| [24030] Apache auth_ldap module multiple format strings
9465| [24008] Apache mod_ssl custom error message denial of service
9466| [24003] Apache mod_auth_pgsql module multiple syslog format strings
9467| [23612] Apache mod_imap referer field cross-site scripting
9468| [23173] Apache Struts error message cross-site scripting
9469| [22942] Apache Tomcat directory listing denial of service
9470| [22858] Apache Multi-Processing Module code allows denial of service
9471| [22602] RHSA-2005:582 updates for Apache httpd not installed
9472| [22520] Apache mod-auth-shadow "
9473| [22466] ApacheTop symlink
9474| [22109] Apache HTTP Server ssl_engine_kernel client certificate validation
9475| [22006] Apache HTTP Server byte-range filter denial of service
9476| [21567] Apache mod_ssl off-by-one buffer overflow
9477| [21195] Apache HTTP Server header HTTP request smuggling
9478| [20383] Apache HTTP Server htdigest buffer overflow
9479| [19681] Apache Tomcat AJP12 request denial of service
9480| [18993] Apache HTTP server check_forensic symlink attack
9481| [18790] Apache Tomcat Manager cross-site scripting
9482| [18349] Apache HTTP server Apple HFS+ filesystem obtain information
9483| [18348] Apache HTTP server Apple HFS+ filesystem .DS_Store and .ht file disclosure
9484| [18347] Apache HTTP server Apple Mac OS X Server mod_digest_apple module could allow an attacker to replay responses
9485| [17961] Apache Web server ServerTokens has not been set
9486| [17930] Apache HTTP Server HTTP GET request denial of service
9487| [17785] Apache mod_include module buffer overflow
9488| [17671] Apache HTTP Server SSLCipherSuite bypass restrictions
9489| [17473] Apache HTTP Server Satisfy directive allows access to resources
9490| [17413] Apache htpasswd buffer overflow
9491| [17384] Apache HTTP Server environment variable configuration file buffer overflow
9492| [17382] Apache HTTP Server IPv6 apr_util denial of service
9493| [17366] Apache HTTP Server mod_dav module LOCK denial of service
9494| [17273] Apache HTTP Server speculative mode denial of service
9495| [17200] Apache HTTP Server mod_ssl denial of service
9496| [16890] Apache HTTP Server server-info request has been detected
9497| [16889] Apache HTTP Server server-status request has been detected
9498| [16705] Apache mod_ssl format string attack
9499| [16524] Apache HTTP Server ap_get_mime_headers_core denial of service
9500| [16387] Apache HTTP Server mod_proxy Content-Length buffer overflow
9501| [16230] Apache HTTP Server PHP denial of service
9502| [16214] Apache mod_ssl ssl_util_uuencode_binary buffer overflow
9503| [15958] Apache HTTP Server authentication modules memory corruption
9504| [15547] Apache HTTP Server mod_disk_cache local information disclosure
9505| [15540] Apache HTTP Server socket starvation denial of service
9506| [15467] Novell GroupWise WebAccess using Apache Web server allows viewing of files on the server
9507| [15422] Apache HTTP Server mod_access information disclosure
9508| [15419] Apache HTTP Server mod_ssl plain HTTP request denial of service
9509| [15293] Apache for Cygwin "
9510| [15065] Apache-SSL has a default password
9511| [15041] Apache HTTP Server mod_digest module could allow an attacker to replay responses
9512| [15015] Apache httpd server httpd.conf could allow a local user to bypass restrictions
9513| [14751] Apache Mod_python output filter information disclosure
9514| [14125] Apache HTTP Server mod_userdir module information disclosure
9515| [14075] Apache HTTP Server mod_php file descriptor leak
9516| [13703] Apache HTTP Server account
9517| [13689] Apache HTTP Server configuration allows symlinks
9518| [13688] Apache HTTP Server configuration allows SSI
9519| [13687] Apache HTTP Server Server: header value
9520| [13685] Apache HTTP Server ServerTokens value
9521| [13684] Apache HTTP Server ServerSignature value
9522| [13672] Apache HTTP Server config allows directory autoindexing
9523| [13671] Apache HTTP Server default content
9524| [13670] Apache HTTP Server config file directive references outside content root
9525| [13668] Apache HTTP Server httpd not running in chroot environment
9526| [13666] Apache HTTP Server CGI directory contains possible command interpreter or compiler
9527| [13664] Apache HTTP Server config file contains ScriptAlias entry
9528| [13663] Apache HTTP Server CGI support modules loaded
9529| [13661] Apache HTTP Server config file contains AddHandler entry
9530| [13660] Apache HTTP Server 500 error page not CGI script
9531| [13659] Apache HTTP Server 413 error page not CGI script
9532| [13658] Apache HTTP Server 403 error page not CGI script
9533| [13657] Apache HTTP Server 401 error page not CGI script
9534| [13552] Apache HTTP Server mod_cgid module information disclosure
9535| [13550] Apache GET request directory traversal
9536| [13516] Apache Cocoon XMLForm and JXForm could allow execution of code
9537| [13499] Apache Cocoon directory traversal allows downloading of boot.ini file
9538| [13429] Apache Tomcat non-HTTP request denial of service
9539| [13400] Apache HTTP server mod_alias and mod_rewrite buffer overflow
9540| [13295] Apache weak password encryption
9541| [13254] Apache Tomcat .jsp cross-site scripting
9542| [13125] Apache::Gallery Inline::C could allow arbitrary code execution
9543| [13086] Apache Jakarta Tomcat mod_jk format string allows remote access
9544| [12681] Apache HTTP Server mod_proxy could allow mail relaying
9545| [12662] Apache HTTP Server rotatelogs denial of service
9546| [12554] Apache Tomcat stores password in plain text
9547| [12553] Apache HTTP Server redirects and subrequests denial of service
9548| [12552] Apache HTTP Server FTP proxy server denial of service
9549| [12551] Apache HTTP Server prefork MPM denial of service
9550| [12550] Apache HTTP Server weaker than expected encryption
9551| [12549] Apache HTTP Server type-map file denial of service
9552| [12206] Apache Tomcat /opt/tomcat directory insecure permissions
9553| [12102] Apache Jakarta Tomcat MS-DOS device name request denial of service
9554| [12091] Apache HTTP Server apr_password_validate denial of service
9555| [12090] Apache HTTP Server apr_psprintf code execution
9556| [11804] Apache HTTP Server mod_access_referer denial of service
9557| [11750] Apache HTTP Server could leak sensitive file descriptors
9558| [11730] Apache HTTP Server error log and access log terminal escape sequence injection
9559| [11703] Apache long slash path allows directory listing
9560| [11695] Apache HTTP Server LF (Line Feed) denial of service
9561| [11694] Apache HTTP Server filestat.c denial of service
9562| [11438] Apache HTTP Server MIME message boundaries information disclosure
9563| [11412] Apache HTTP Server error log terminal escape sequence injection
9564| [11196] Apache Tomcat examples and ROOT Web applications cross-site scripting
9565| [11195] Apache Tomcat web.xml could be used to read files
9566| [11194] Apache Tomcat URL appended with a null character could list directories
9567| [11139] Apache HTTP Server mass virtual hosting with mod_rewrite or mod_vhost_alias could allow an attacker to obtain files
9568| [11126] Apache HTTP Server illegal character file disclosure
9569| [11125] Apache HTTP Server DOS device name HTTP POST code execution
9570| [11124] Apache HTTP Server DOS device name denial of service
9571| [11088] Apache HTTP Server mod_vhost_alias CGI source disclosure
9572| [10938] Apache HTTP Server printenv test CGI cross-site scripting
9573| [10771] Apache Tomcat mod_jk module multiple HTTP GET request buffer overflow
9574| [10575] Apache mod_php module could allow an attacker to take over the httpd process
9575| [10499] Apache HTTP Server WebDAV HTTP POST view source
9576| [10457] Apache HTTP Server mod_ssl "
9577| [10415] Apache HTTP Server htdigest insecure system() call could allow command execution
9578| [10414] Apache HTTP Server htdigest multiple buffer overflows
9579| [10413] Apache HTTP Server htdigest temporary file race condition
9580| [10412] Apache HTTP Server htpasswd temporary file race condition
9581| [10376] Apache Tomcat invoker servlet used in conjunction with the default servlet reveals source code
9582| [10348] Apache Tomcat HTTP GET request DOS device reference could cause a denial of service
9583| [10281] Apache HTTP Server ab.c ApacheBench long response buffer overflow
9584| [10280] Apache HTTP Server shared memory scorecard overwrite
9585| [10263] Apache Tomcat mod_jk or mod_jserv connector directory disclosure
9586| [10241] Apache HTTP Server Host: header cross-site scripting
9587| [10230] Slapper worm variants A, B, and C target OpenSSL/Apache systems
9588| [10208] Apache HTTP Server mod_dav denial of service
9589| [10206] HP VVOS Apache mod_ssl denial of service
9590| [10200] Apache HTTP Server stderr denial of service
9591| [10175] Apache Tomcat org.apache.catalina.servlets.DefaultServlet reveals source code
9592| [10169] Slapper worm variant (Slapper.C) targets OpenSSL/Apache systems
9593| [10154] Slapper worm variant (Slapper.B) targets OpenSSL/Apache systems
9594| [10098] Slapper worm targets OpenSSL/Apache systems
9595| [9876] Apache HTTP Server cgi/cgid request could disclose the path to a requested script
9596| [9875] Apache HTTP Server .var file request could disclose installation path
9597| [9863] Apache Tomcat web.xml file could allow a remote attacker to bypass restrictions
9598| [9808] Apache HTTP Server non-Unix version URL encoded directory traversal
9599| [9623] Apache HTTP Server ap_log_rerror() path disclosure
9600| [9520] Apache Tomcat /servlet/ mapping cross-site scripting
9601| [9415] Apache HTTP Server mod_ssl .htaccess off-by-one buffer overflow
9602| [9396] Apache Tomcat null character to threads denial of service
9603| [9394] Apache Tomcat HTTP request for LPT9 reveals Web root path
9604| [9249] Apache HTTP Server chunked encoding heap buffer overflow
9605| [9208] Apache Tomcat sample file requests could reveal directory listing and path to Web root directory
9606| [8932] Apache Tomcat example class information disclosure
9607| [8633] Apache HTTP Server with mod_rewrite could allow an attacker to bypass directives
9608| [8629] Apache HTTP Server double-reverse DNS lookup spoofing
9609| [8589] Apache HTTP Server for Windows DOS batch file remote command execution
9610| [8457] Oracle9i Application Server Apache PL/SQL HTTP Location header buffer overflow
9611| [8455] Oracle9i Application Server default installation could allow an attacker to access certain Apache Services
9612| [8400] Apache HTTP Server mod_frontpage buffer overflows
9613| [8326] Apache HTTP Server multiple MIME headers (sioux) denial of service
9614| [8308] Apache "
9615| [8275] Apache HTTP Server with Multiviews enabled could disclose directory contents
9616| [8119] Apache and PHP OPTIONS request reveals "
9617| [8054] Apache is running on the system
9618| [8029] Mandrake Linux default Apache configuration could allow an attacker to browse files and directories
9619| [8027] Mandrake Linux default Apache configuration has remote management interface enabled
9620| [8026] Mandrake Linux Apache sample programs could disclose sensitive information about the server
9621| [7836] Apache HTTP Server log directory denial of service
9622| [7815] Apache for Windows "
9623| [7810] Apache HTTP request could result in unexpected behavior
9624| [7599] Apache Tomcat reveals installation path
9625| [7494] Apache "
9626| [7419] Apache Web Server could allow remote attackers to overwrite .log files
9627| [7363] Apache Web Server hidden HTTP requests
9628| [7249] Apache mod_proxy denial of service
9629| [7129] Linux with Apache Web server could allow an attacker to determine if a specified username exists
9630| [7103] Apple Mac OS X used with Apache Web server could disclose directory contents
9631| [7059] Apache "
9632| [7057] Apache "
9633| [7056] Apache "
9634| [7055] Apache "
9635| [7054] Apache "
9636| [6997] Apache Jakarta Tomcat error message may reveal information
9637| [6971] Apache Jakarta Tomcat may reveal JSP source code with missing HTTP protocol specification
9638| [6970] Apache crafted HTTP request could reveal the internal IP address
9639| [6921] Apache long slash path allows directory listing
9640| [6687] Apple Mac OS X used with Apache Web server could allow arbitrary file disclosure
9641| [6527] Apache Web Server for Windows and OS2 denial of service
9642| [6316] Apache Jakarta Tomcat may reveal JSP source code
9643| [6305] Apache Jakarta Tomcat directory traversal
9644| [5926] Linux Apache symbolic link
9645| [5659] Apache Web server discloses files when used with php script
9646| [5310] Apache mod_rewrite allows attacker to view arbitrary files
9647| [5204] Apache WebDAV directory listings
9648| [5197] Apache Web server reveals CGI script source code
9649| [5160] Apache Jakarta Tomcat default installation
9650| [5099] Trustix Secure Linux installs Apache with world writable access
9651| [4968] Apache Jakarta Tomcat snoop servlet gives out information which could be used in attack
9652| [4967] Apache Jakarta Tomcat 404 error reveals the pathname of the requested file
9653| [4931] Apache source.asp example file allows users to write to files
9654| [4575] IBM HTTP Server running Apache allows users to directory listing and file retrieval
9655| [4205] Apache Jakarta Tomcat delivers file contents
9656| [2084] Apache on Debian by default serves the /usr/doc directory
9657| [1630] MessageMedia UnityMail and Apache Web server MIME header flood denial of service
9658| [697] Apache HTTP server beck exploit
9659| [331] Apache cookies buffer overflow
9660|
9661| Exploit-DB - https://www.exploit-db.com:
9662| [31130] Apache Tomcat <= 6.0.15 Cookie Quote Handling Remote Information Disclosure Vulnerability
9663| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
9664| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
9665| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
9666| [30563] Apache Tomcat <= 5.5.15 Cal2.JSP Cross-Site Scripting Vulnerability
9667| [30496] Apache Tomcat <= 6.0.13 Cookie Handling Quote Delimiter Session ID Disclosure
9668| [30495] Apache Tomcat <= 6.0.13 Host Manager Servlet Cross Site Scripting Vulnerability
9669| [30191] Apache MyFaces Tomahawk JSF Framework 1.1.5 Autoscroll Parameter Cross Site Scripting Vulnerability
9670| [30189] Apache Tomcat <= 6.0.13 JSP Example Web Applications Cross Site Scripting Vulnerability
9671| [30052] Apache Tomcat 6.0.10 Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities
9672| [29930] Apache AXIS 1.0 Non-Existent WSDL Path Information Disclosure Vulnerability
9673| [29859] Apache Roller OGNL Injection
9674| [29739] Apache HTTP Server Tomcat 5.x/6.0.x Directory Traversal Vulnerability
9675| [29435] Apache Tomcat 5.5.25 - CSRF Vulnerabilities
9676| [29316] Apache + PHP 5.x - Remote Code Execution (Multithreaded Scanner) (2)
9677| [29290] Apache / PHP 5.x Remote Code Execution Exploit
9678| [28713] Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object RCE
9679| [28424] Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness
9680| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
9681| [28254] Apache Tomcat 5 Information Disclosure Vulnerability
9682| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
9683| [27397] Apache suEXEC Privilege Elevation / Information Disclosure
9684| [27135] Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
9685| [27096] Apache Geronimo 1.0 Error Page XSS
9686| [27095] Apache Tomcat / Geronimo 1.0 Sample Script cal2.jsp time Parameter XSS
9687| [26710] Apache CXF prior to 2.5.10, 2.6.7 and 2.7.4 - Denial of Service
9688| [26542] Apache Struts 1.2.7 Error Response Cross-Site Scripting Vulnerability
9689| [25986] Plesk Apache Zeroday Remote Exploit
9690| [25980] Apache Struts includeParams Remote Code Execution
9691| [25625] Apache 1.3.x HTDigest Realm Command Line Argument Buffer Overflow Vulnerability (2)
9692| [25624] Apache 1.3.x HTDigest Realm Command Line Argument Buffer Overflow Vulnerability (1)
9693| [24874] Apache Struts ParametersInterceptor Remote Code Execution
9694| [24744] Apache Rave 0.11 - 0.20 - User Information Disclosure
9695| [24694] Apache 1.3.x mod_include Local Buffer Overflow Vulnerability
9696| [24590] Apache 2.0.x mod_ssl Remote Denial of Service Vulnerability
9697| [23751] Apache Cygwin 1.3.x/2.0.x Directory Traversal Vulnerability
9698| [23581] Apache 2.0.4x mod_perl Module File Descriptor Leakage Vulnerability
9699| [23482] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (2)
9700| [23481] Apache 2.0.4x mod_php Module File Descriptor Leakage Vulnerability (1)
9701| [23296] Red Hat Apache 2.0.40 Directory Index Default Configuration Error
9702| [23282] apache cocoon 2.14/2.2 - Directory Traversal vulnerability
9703| [23245] Apache Tomcat 4.0.x Non-HTTP Request Denial of Service Vulnerability
9704| [23119] Apache::Gallery 0.4/0.5/0.6 Insecure Local File Storage Privilege Escalation Vulnerability
9705| [22505] Apache Mod_Access_Referer 1.0.2 NULL Pointer Dereference Denial of Service Vulnerability
9706| [22205] Apache Tomcat 3.x Null Byte Directory/File Disclosure Vulnerability
9707| [22191] Apache Web Server 2.0.x MS-DOS Device Name Denial of Service Vulnerability
9708| [22068] Apache 1.3.x,Tomcat 4.0.x/4.1.x Mod_JK Chunked Encoding Denial of Service Vulnerability
9709| [21885] Apache 1.3/2.0.x Server Side Include Cross Site Scripting Vulnerability
9710| [21882] Apache Tomcat 3.2 Directory Disclosure Vulnerability
9711| [21854] Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability
9712| [21853] Apache Tomcat 3/4 DefaultServlet File Disclosure Vulnerability
9713| [21734] Apache Tomcat 4.1 JSP Request Cross Site Scripting Vulnerability
9714| [21719] Apache 2.0 Path Disclosure Vulnerability
9715| [21697] Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
9716| [21605] Apache Tomcat 4.0.3 DoS Device Name Cross Site Scripting Vulnerability
9717| [21604] Apache Tomcat 4.0.3 Servlet Mapping Cross Site Scripting Vulnerability
9718| [21560] Apache 1.x/2.0.x Chunked-Encoding Memory Corruption Vulnerability (2)
9719| [21559] Apache 1.x/2.0.x Chunked-Encoding Memory Corruption Vulnerability (1)
9720| [21534] Apache Tomcat 3/4 JSP Engine Denial of Service Vulnerability
9721| [21492] Apache Tomcat 3.2.3/3.2.4 RealPath.JSP Malformed Request Information Disclosure
9722| [21491] Apache Tomcat 3.2.3/3.2.4 Example Files Web Root Path Disclosure
9723| [21490] Apache Tomcat 3.2.3/3.2.4 Source.JSP Malformed Request Information Disclosure
9724| [21412] Apache Tomcat 4.0/4.1 Servlet Path Disclosure Vulnerability
9725| [21350] Apache Win32 1.3.x/2.0.x Batch File Remote Command Execution Vulnerability
9726| [21204] Apache 1.3.20 Win32 PHP.EXE Remote File Disclosure Vulnerability
9727| [21112] Red Hat Linux 7.0 Apache Remote Username Enumeration Vulnerability
9728| [21067] Apache 1.0/1.2/1.3 Server Address Disclosure Vulnerability
9729| [21002] Apache 1.3 Possible Directory Index Disclosure Vulnerability
9730| [20911] Apache 1.3.14 Mac File Protection Bypass Vulnerability
9731| [20716] apache tomcat 3.0 - Directory Traversal vulnerability
9732| [20695] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (4)
9733| [20694] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (3)
9734| [20693] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (2)
9735| [20692] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (1)
9736| [20595] NCSA 1.3/1.4.x/1.5,Apache httpd 0.8.11/0.8.14 ScriptAlias Source Retrieval Vulnerability
9737| [20558] Apache 1.2 Web Server DoS Vulnerability
9738| [20466] Apache 1.3 Web Server with Php 3 File Disclosure Vulnerability
9739| [20435] Apache 0.8.x/1.0.x,NCSA httpd 1.x test-cgi Directory Listing Vulnerability
9740| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
9741| [20210] Apache 1.3.12 WebDAV Directory Listings Vulnerability
9742| [20131] Apache Tomcat 3.1 Path Revealing Vulnerability
9743| [19975] Apache 1.3.6/1.3.9/1.3.11/1.3.12/1.3.20 Root Directory Access Vulnerability
9744| [19828] Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability
9745| [19536] Apache <= 1.1,NCSA httpd <= 1.5.2,Netscape Server 1.12/1.1/2.0 a nph-test-cgi Vulnerability
9746| [19231] PHP apache_request_headers Function Buffer Overflow
9747| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
9748| [18897] Oracle Weblogic Apache Connector POST Request Buffer Overflow
9749| [18619] Apache Tomcat Remote Exploit (PUT Request) and Account Scanner
9750| [18452] Apache Struts Multiple Persistent Cross-Site Scripting Vulnerabilities
9751| [18442] Apache httpOnly Cookie Disclosure
9752| [18329] Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities
9753| [18221] Apache HTTP Server Denial of Service
9754| [17969] Apache mod_proxy Reverse Proxy Exposure Vulnerability PoC
9755| [17696] Apache httpd Remote Denial of Service (memory exhaustion)
9756| [17691] Apache Struts < 2.2.0 - Remote Command Execution
9757| [16798] Apache mod_jk 1.2.20 Buffer Overflow
9758| [16782] Apache Win32 Chunked Encoding
9759| [16752] Apache module mod_rewrite LDAP protocol Buffer Overflow
9760| [16317] Apache Tomcat Manager Application Deployer Authenticated Code Execution
9761| [15710] Apache Archiva 1.0 - 1.3.1 CSRF Vulnerability
9762| [15319] Apache 2.2 (Windows) Local Denial of Service
9763| [14617] Apache JackRabbit 2.0.0 webapp XPath Injection
9764| [14489] Apache Tomcat < 6.0.18 utf8 - Directory Traversal vulnerability
9765| [12721] Apache Axis2 1.4.1 - Local File Inclusion Vulnerability
9766| [12689] Authenticated Cross-Site Scripting Vulnerability (XSS) within Apache Axis2 administration console
9767| [12343] Apache Tomcat 5.5.0 to 5.5.29 & 6.0.0 to 6.0.26 - Information Disclosure Vulnerability
9768| [12330] Apache OFBiz - Multiple XSS
9769| [12264] Apache OFBiz - FULLADMIN Creator PoC Payload
9770| [12263] Apache OFBiz - SQL Remote Execution PoC Payload
9771| [11662] Apache Spamassassin Milter Plugin Remote Root Command Execution
9772| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
9773| [10811] Joomla.Tutorials GHDB: Apache directory listing Download Vulnerability
9774| [10292] Apache Tomcat 3.2.1 - 404 Error Page Cross Site Scripting Vulnerability
9775| [9995] Apache Tomcat Form Authentication Username Enumeration Weakness
9776| [9994] Apache Tomcat Cookie Quote Handling Remote Information Disclosure Vulnerability
9777| [9993] Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vulnerability
9778| [8842] Apache mod_dav / svn Remote Denial of Service Exploit
9779| [8458] Apache Geronimo <= 2.1.3 - Multiple Directory Traversal Vulnerabilities
9780| [7264] Apache Tomcat runtime.getRuntime().exec() Privilege Escalation (win)
9781| [6229] apache tomcat < 6.0.18 utf8 - Directory Traversal vulnerability
9782| [6100] Apache mod_jk 1.2.19 Remote Buffer Overflow Exploit (win32)
9783| [6089] Bea Weblogic Apache Connector Code Exec / Denial of Service Exploit
9784| [5386] Apache Tomcat Connector jk2-2.0.2 (mod_jk2) Remote Overflow Exploit
9785| [5330] Apache 2.0 mod_jk2 2.0.2 - Remote Buffer Overflow Exploit (win32)
9786| [4552] Apache Tomcat (webdav) Remote File Disclosure Exploit (ssl support)
9787| [4530] Apache Tomcat (webdav) Remote File Disclosure Exploit
9788| [4162] Apache Tomcat Connector (mod_jk) Remote Exploit (exec-shield)
9789| [4093] Apache mod_jk 1.2.19/1.2.20 Remote Buffer Overflow Exploit
9790| [3996] Apache 2.0.58 mod_rewrite Remote Overflow Exploit (win2k3)
9791| [3680] Apache Mod_Rewrite Off-by-one Remote Overflow Exploit (win32)
9792| [3384] Ubuntu/Debian Apache 1.3.33/1.3.34 (CGI TTY) Local Root Exploit
9793| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
9794| [2061] Apache Tomcat < 5.5.17 Remote Directory Listing Vulnerability
9795| [1056] Apache <= 2.0.49 Arbitrary Long HTTP Headers Denial of Service
9796| [855] Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
9797| [764] Apache OpenSSL - Remote Exploit (Multiple Targets) (OpenFuckV2.c)
9798| [587] Apache <= 1.3.31 mod_include Local Buffer Overflow Exploit
9799| [466] htpasswd Apache 1.3.31 - Local Exploit
9800| [371] Apache HTTPd Arbitrary Long HTTP Headers DoS (c version)
9801| [360] Apache HTTPd Arbitrary Long HTTP Headers DoS
9802| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
9803| [126] Apache mod_gzip (with debug_mode) <= 1.2.26.1a Remote Exploit
9804| [67] Apache 1.3.x mod_mylo Remote Code Execution Exploit
9805| [38] Apache <= 2.0.45 APR Remote Exploit -Apache-Knacker.pl
9806| [34] Webfroot Shoutbox < 2.32 (Apache) Remote Exploit
9807| [11] Apache <= 2.0.44 Linux Remote Denial of Service Exploit
9808| [9] Apache HTTP Server 2.x Memory Leak Exploit
9809|
9810| OpenVAS (Nessus) - http://www.openvas.org:
9811| [902924] Apache Struts2 Showcase Skill Name Remote Code Execution Vulnerability
9812| [902837] PHP 'apache_request_headers()' Function Buffer Overflow Vulnerability (Windows)
9813| [902830] Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability
9814| [902664] Apache Traffic Server HTTP Host Header Denial of Service Vulnerability
9815| [901203] Apache httpd Web Server Range Header Denial of Service Vulnerability
9816| [901110] Apache ActiveMQ Source Code Information Disclosure Vulnerability
9817| [901105] Apache OFBiz Multiple Cross Site Scripting Vulnerabilities
9818| [900842] Apache 'mod_proxy_ftp' Module Command Injection Vulnerability (Linux)
9819| [900841] Apache 'mod_proxy_ftp' Module Denial Of Service Vulnerability (Linux)
9820| [900573] Apache APR-Utils XML Parser Denial of Service Vulnerability
9821| [900572] Apache APR-Utils Multiple Denial of Service Vulnerabilities
9822| [900571] Apache APR-Utils Version Detection
9823| [900499] Apache mod_proxy_ajp Information Disclosure Vulnerability
9824| [900496] Apache Tiles Multiple XSS Vulnerability
9825| [900493] Apache Tiles Version Detection
9826| [900107] Apache mod_proxy_ftp Wildcard Characters XSS Vulnerability
9827| [900021] Apache Tomcat Cross-Site Scripting and Security Bypass Vulnerabilities
9828| [880086] CentOS Update for apache CESA-2008:0004-01 centos2 i386
9829| [870175] RedHat Update for apache RHSA-2008:0004-01
9830| [864591] Fedora Update for apache-poi FEDORA-2012-10835
9831| [864383] Fedora Update for apache-commons-compress FEDORA-2012-8428
9832| [864280] Fedora Update for apache-commons-compress FEDORA-2012-8465
9833| [864250] Fedora Update for apache-poi FEDORA-2012-7683
9834| [864249] Fedora Update for apache-poi FEDORA-2012-7686
9835| [863993] Fedora Update for apache-commons-daemon FEDORA-2011-10880
9836| [863466] Fedora Update for apache-commons-daemon FEDORA-2011-10936
9837| [855821] Solaris Update for Apache 1.3 122912-19
9838| [855812] Solaris Update for Apache 1.3 122911-19
9839| [855737] Solaris Update for Apache 1.3 122911-17
9840| [855731] Solaris Update for Apache 1.3 122912-17
9841| [855695] Solaris Update for Apache 1.3 122911-16
9842| [855645] Solaris Update for Apache 1.3 122912-16
9843| [855587] Solaris Update for kernel update and Apache 108529-29
9844| [855566] Solaris Update for Apache 116973-07
9845| [855531] Solaris Update for Apache 116974-07
9846| [855524] Solaris Update for Apache 2 120544-14
9847| [855494] Solaris Update for Apache 1.3 122911-15
9848| [855478] Solaris Update for Apache Security 114145-11
9849| [855472] Solaris Update for Apache Security 113146-12
9850| [855179] Solaris Update for Apache 1.3 122912-15
9851| [855147] Solaris Update for kernel update and Apache 108528-29
9852| [855077] Solaris Update for Apache 2 120543-14
9853| [850196] SuSE Update for apache2 openSUSE-SU-2012:0314-1 (apache2)
9854| [850088] SuSE Update for apache2 SUSE-SA:2007:061
9855| [850009] SuSE Update for apache2,apache SUSE-SA:2008:021
9856| [841209] Ubuntu Update for apache2 USN-1627-1
9857| [840900] Ubuntu Update for apache2 USN-1368-1
9858| [840798] Ubuntu Update for apache2 USN-1259-1
9859| [840734] Ubuntu Update for apache2 USN-1199-1
9860| [840542] Ubuntu Update for apache2 vulnerabilities USN-1021-1
9861| [840504] Ubuntu Update for apache2 vulnerability USN-990-2
9862| [840399] Ubuntu Update for apache2 vulnerabilities USN-908-1
9863| [840304] Ubuntu Update for apache2 vulnerabilities USN-575-1
9864| [840118] Ubuntu Update for libapache2-mod-perl2 vulnerability USN-488-1
9865| [840092] Ubuntu Update for apache2 vulnerabilities USN-499-1
9866| [840039] Ubuntu Update for libapache2-mod-python vulnerability USN-430-1
9867| [835253] HP-UX Update for Apache Web Server HPSBUX02645
9868| [835247] HP-UX Update for Apache-based Web Server HPSBUX02612
9869| [835243] HP-UX Update for Apache Running Tomcat Servlet Engine HPSBUX02579
9870| [835236] HP-UX Update for Apache with PHP HPSBUX02543
9871| [835233] HP-UX Update for Apache-based Web Server HPSBUX02531
9872| [835224] HP-UX Update for Apache-based Web Server HPSBUX02465
9873| [835200] HP-UX Update for Apache Web Server Suite HPSBUX02431
9874| [835190] HP-UX Update for Apache Web Server Suite HPSBUX02401
9875| [835188] HP-UX Update for Apache HPSBUX02308
9876| [835181] HP-UX Update for Apache With PHP HPSBUX02332
9877| [835180] HP-UX Update for Apache with PHP HPSBUX02342
9878| [835172] HP-UX Update for Apache HPSBUX02365
9879| [835168] HP-UX Update for Apache HPSBUX02313
9880| [835148] HP-UX Update for Apache HPSBUX01064
9881| [835139] HP-UX Update for Apache with PHP HPSBUX01090
9882| [835131] HP-UX Update for Apache HPSBUX00256
9883| [835119] HP-UX Update for Apache Remote Execution of Arbitrary Code HPSBUX02186
9884| [835104] HP-UX Update for Apache HPSBUX00224
9885| [835103] HP-UX Update for Apache mod_cgid HPSBUX00301
9886| [835101] HP-UX Update for Apache HPSBUX01232
9887| [835080] HP-UX Update for Apache HPSBUX02273
9888| [835078] HP-UX Update for ApacheStrong HPSBUX00255
9889| [835044] HP-UX Update for Apache HPSBUX01019
9890| [835040] HP-UX Update for Apache PHP HPSBUX00207
9891| [835025] HP-UX Update for Apache HPSBUX00197
9892| [835023] HP-UX Update for Apache HPSBUX01022
9893| [835022] HP-UX Update for Apache HPSBUX02292
9894| [835005] HP-UX Update for Apache HPSBUX02262
9895| [831759] Mandriva Update for apache-mod_security MDVSA-2012:182 (apache-mod_security)
9896| [831737] Mandriva Update for apache MDVSA-2012:154-1 (apache)
9897| [831534] Mandriva Update for apache MDVSA-2012:012 (apache)
9898| [831523] Mandriva Update for apache MDVSA-2012:003 (apache)
9899| [831491] Mandriva Update for apache MDVSA-2011:168 (apache)
9900| [831460] Mandriva Update for apache MDVSA-2011:144 (apache)
9901| [831449] Mandriva Update for apache MDVSA-2011:130 (apache)
9902| [831357] Mandriva Update for apache MDVSA-2011:057 (apache)
9903| [831132] Mandriva Update for apache MDVSA-2010:153 (apache)
9904| [831131] Mandriva Update for apache MDVSA-2010:152 (apache)
9905| [830989] Mandriva Update for apache-mod_auth_shadow MDVSA-2010:081 (apache-mod_auth_shadow)
9906| [830931] Mandriva Update for apache MDVSA-2010:057 (apache)
9907| [830926] Mandriva Update for apache MDVSA-2010:053 (apache)
9908| [830918] Mandriva Update for apache-mod_security MDVSA-2010:050 (apache-mod_security)
9909| [830799] Mandriva Update for apache-conf MDVSA-2009:300-2 (apache-conf)
9910| [830797] Mandriva Update for apache-conf MDVSA-2009:300-1 (apache-conf)
9911| [830791] Mandriva Update for apache-conf MDVA-2010:011 (apache-conf)
9912| [830652] Mandriva Update for apache MDVSA-2008:195 (apache)
9913| [830621] Mandriva Update for apache-conf MDVA-2008:129 (apache-conf)
9914| [830581] Mandriva Update for apache MDVSA-2008:016 (apache)
9915| [830294] Mandriva Update for apache MDKSA-2007:140 (apache)
9916| [830196] Mandriva Update for apache MDKSA-2007:235 (apache)
9917| [830112] Mandriva Update for apache MDKSA-2007:127 (apache)
9918| [830109] Mandriva Update for apache-mod_perl MDKSA-2007:083 (apache-mod_perl)
9919| [802425] Apache Struts2 Showcase Arbitrary Java Method Execution vulnerability
9920| [802423] Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities
9921| [802422] Apache Struts Showcase Multiple Persistence Cross-Site Scripting Vulnerabilities
9922| [802415] Apache Tomcat Multiple Security Bypass Vulnerabilities (Win)
9923| [802385] Apache Tomcat Request Object Security Bypass Vulnerability (Win)
9924| [802384] Apache Tomcat Parameter Handling Denial of Service Vulnerability (Win)
9925| [802378] Apache Tomcat Hash Collision Denial Of Service Vulnerability
9926| [801942] Apache Archiva Multiple Vulnerabilities
9927| [801940] Apache Struts2 'XWork' Information Disclosure Vulnerability
9928| [801663] Apache Struts2/XWork Remote Command Execution Vulnerability
9929| [801521] Apache APR-util 'buckets/apr_brigade.c' Denial Of Service Vulnerability
9930| [801284] Apache Derby Information Disclosure Vulnerability
9931| [801203] Apache ActiveMQ Persistent Cross-Site Scripting Vulnerability
9932| [800837] Apache 'mod_deflate' Denial Of Service Vulnerability - July09
9933| [800827] Apache 'mod_proxy_http.c' Denial Of Service Vulnerability
9934| [800680] Apache APR Version Detection
9935| [800679] Apache APR and APR-util Multiple Integer Overflow Vulnerabilities
9936| [800678] Apache Roller 'q' Parameter Cross Site Scripting Vulnerability
9937| [800677] Apache Roller Version Detection
9938| [800279] Apache mod_jk Module Version Detection
9939| [800278] Apache Struts Cross Site Scripting Vulnerability
9940| [800277] Apache Tomcat mod_jk Information Disclosure Vulnerability
9941| [800276] Apache Struts Version Detection
9942| [800271] Apache Struts Directory Traversal Vulnerability
9943| [800024] Apache Tomcat RemoteFilterValve Security Bypass Vulnerability
9944| [103333] Apache HTTP Server 'ap_pregsub()' Function Local Denial of Service Vulnerability
9945| [103293] Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
9946| [103122] Apache Web Server ETag Header Information Disclosure Weakness
9947| [103074] Apache Continuum Cross Site Scripting Vulnerability
9948| [103073] Apache Continuum Detection
9949| [103053] Apache CouchDB Web Administration Interface Cross Site Scripting Vulnerability
9950| [101023] Apache Open For Business Weak Password security check
9951| [101020] Apache Open For Business HTML injection vulnerability
9952| [101019] Apache Open For Business service detection
9953| [100924] Apache Archiva Cross Site Request Forgery Vulnerability
9954| [100923] Apache Archiva Detection
9955| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
9956| [100814] Apache Axis2 Document Type Declaration Processing Security Vulnerability
9957| [100813] Apache Axis2 Detection
9958| [100797] Apache Traffic Server Remote DNS Cache Poisoning Vulnerability
9959| [100795] Apache Derby Detection
9960| [100762] Apache CouchDB Cross Site Request Forgery Vulnerability
9961| [100725] Apache HTTP Server Multiple Remote Denial of Service Vulnerabilities
9962| [100613] Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
9963| [100514] Apache Multiple Security Vulnerabilities
9964| [100211] Apache 'Options' and 'AllowOverride' Directives Security Bypass Vulnerability
9965| [100172] Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability
9966| [100171] Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability
9967| [100130] Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vulnerability
9968| [72626] Debian Security Advisory DSA 2579-1 (apache2)
9969| [72612] FreeBSD Ports: apache22
9970| [71551] Gentoo Security Advisory GLSA 201206-25 (apache)
9971| [71550] Gentoo Security Advisory GLSA 201206-24 (apache tomcat)
9972| [71512] FreeBSD Ports: apache
9973| [71485] Debian Security Advisory DSA 2506-1 (libapache-mod-security)
9974| [71256] Debian Security Advisory DSA 2452-1 (apache2)
9975| [71238] Debian Security Advisory DSA 2436-1 (libapache2-mod-fcgid)
9976| [70737] FreeBSD Ports: apache
9977| [70724] Debian Security Advisory DSA 2405-1 (apache2)
9978| [70600] FreeBSD Ports: apache
9979| [70253] FreeBSD Ports: apache, apache-event, apache-itk, apache-peruser, apache-worker
9980| [70235] Debian Security Advisory DSA 2298-2 (apache2)
9981| [70233] Debian Security Advisory DSA 2298-1 (apache2)
9982| [69988] Debian Security Advisory DSA 2279-1 (libapache2-mod-authnz-external)
9983| [69338] Debian Security Advisory DSA 2202-1 (apache2)
9984| [67868] FreeBSD Ports: apache
9985| [66816] FreeBSD Ports: apache
9986| [66553] Mandriva Security Advisory MDVSA-2009:189-1 (apache-mod_auth_mysql)
9987| [66414] Mandriva Security Advisory MDVSA-2009:323 (apache)
9988| [66106] SuSE Security Advisory SUSE-SA:2009:050 (apache2,libapr1)
9989| [66081] SLES11: Security update for Apache 2
9990| [66074] SLES10: Security update for Apache 2
9991| [66070] SLES9: Security update for Apache 2
9992| [65998] SLES10: Security update for apache2-mod_python
9993| [65893] SLES10: Security update for Apache 2
9994| [65888] SLES10: Security update for Apache 2
9995| [65575] SLES9: Security update for apache2,apache2-prefork,apache2-worker
9996| [65510] SLES9: Security update for Apache 2
9997| [65472] SLES9: Security update for Apache
9998| [65467] SLES9: Security update for Apache
9999| [65450] SLES9: Security update for apache2
10000| [65390] SLES9: Security update for Apache2
10001| [65363] SLES9: Security update for Apache2
10002| [65309] SLES9: Security update for Apache and mod_ssl
10003| [65296] SLES9: Security update for webdav apache module
10004| [65283] SLES9: Security update for Apache2
10005| [65249] SLES9: Security update for Apache 2
10006| [65230] SLES9: Security update for Apache 2
10007| [65228] SLES9: Security update for Apache 2
10008| [65212] SLES9: Security update for apache2-mod_python
10009| [65209] SLES9: Security update for apache2-worker
10010| [65207] SLES9: Security update for Apache 2
10011| [65168] SLES9: Security update for apache2-mod_python
10012| [65142] SLES9: Security update for Apache2
10013| [65136] SLES9: Security update for Apache 2
10014| [65132] SLES9: Security update for apache
10015| [65131] SLES9: Security update for Apache 2 oes/CORE
10016| [65113] SLES9: Security update for apache2
10017| [65072] SLES9: Security update for apache and mod_ssl
10018| [65017] SLES9: Security update for Apache 2
10019| [64950] Mandrake Security Advisory MDVSA-2009:240 (apache)
10020| [64783] FreeBSD Ports: apache
10021| [64774] Ubuntu USN-802-2 (apache2)
10022| [64653] Ubuntu USN-813-2 (apache2)
10023| [64559] Debian Security Advisory DSA 1834-2 (apache2)
10024| [64532] Mandrake Security Advisory MDVSA-2009:189 (apache-mod_auth_mysql)
10025| [64527] Mandrake Security Advisory MDVSA-2009:184 (apache-mod_security)
10026| [64526] Mandrake Security Advisory MDVSA-2009:183 (apache-mod_security)
10027| [64500] Mandrake Security Advisory MDVSA-2009:168 (apache)
10028| [64443] Ubuntu USN-802-1 (apache2)
10029| [64426] Gentoo Security Advisory GLSA 200907-04 (apache)
10030| [64423] Debian Security Advisory DSA 1834-1 (apache2)
10031| [64391] Mandrake Security Advisory MDVSA-2009:149 (apache)
10032| [64377] Mandrake Security Advisory MDVSA-2009:124-1 (apache)
10033| [64251] Debian Security Advisory DSA 1816-1 (apache2)
10034| [64201] Ubuntu USN-787-1 (apache2)
10035| [64140] Mandrake Security Advisory MDVSA-2009:124 (apache)
10036| [64136] Mandrake Security Advisory MDVSA-2009:102 (apache)
10037| [63565] FreeBSD Ports: apache
10038| [63562] Ubuntu USN-731-1 (apache2)
10039| [61381] Gentoo Security Advisory GLSA 200807-06 (apache)
10040| [61185] FreeBSD Ports: apache
10041| [60582] Gentoo Security Advisory GLSA 200803-19 (apache)
10042| [60387] Slackware Advisory SSA:2008-045-02 apache
10043| [58826] FreeBSD Ports: apache-tomcat
10044| [58825] FreeBSD Ports: apache-tomcat
10045| [58804] FreeBSD Ports: apache
10046| [58745] Gentoo Security Advisory GLSA 200711-06 (apache)
10047| [58360] Debian Security Advisory DSA 1312-1 (libapache-mod-jk)
10048| [57851] Gentoo Security Advisory GLSA 200608-01 (apache)
10049| [57788] Debian Security Advisory DSA 1247-1 (libapache-mod-auth-kerb)
10050| [57335] Debian Security Advisory DSA 1167-1 (apache)
10051| [57201] Debian Security Advisory DSA 1131-1 (apache)
10052| [57200] Debian Security Advisory DSA 1132-1 (apache2)
10053| [57168] Slackware Advisory SSA:2006-209-01 Apache httpd
10054| [57145] FreeBSD Ports: apache
10055| [56731] Slackware Advisory SSA:2006-129-01 Apache httpd
10056| [56729] Slackware Advisory SSA:2006-130-01 Apache httpd redux
10057| [56246] Gentoo Security Advisory GLSA 200602-03 (Apache)
10058| [56212] Debian Security Advisory DSA 952-1 (libapache-auth-ldap)
10059| [56115] Debian Security Advisory DSA 935-1 (libapache2-mod-auth-pgsql)
10060| [56067] FreeBSD Ports: apache
10061| [55803] Slackware Advisory SSA:2005-310-04 apache
10062| [55519] Debian Security Advisory DSA 839-1 (apachetop)
10063| [55392] Gentoo Security Advisory GLSA 200509-12 (Apache)
10064| [55355] FreeBSD Ports: apache
10065| [55284] Debian Security Advisory DSA 807-1 (libapache-mod-ssl)
10066| [55261] Debian Security Advisory DSA 805-1 (apache2)
10067| [55259] Debian Security Advisory DSA 803-1 (apache)
10068| [55129] Gentoo Security Advisory GLSA 200508-15 (apache)
10069| [54739] Gentoo Security Advisory GLSA 200411-18 (apache)
10070| [54724] Gentoo Security Advisory GLSA 200411-03 (apache)
10071| [54712] Gentoo Security Advisory GLSA 200410-21 (apache)
10072| [54689] Gentoo Security Advisory GLSA 200409-33 (net=www/apache)
10073| [54677] Gentoo Security Advisory GLSA 200409-21 (apache)
10074| [54610] Gentoo Security Advisory GLSA 200407-03 (Apache)
10075| [54601] Gentoo Security Advisory GLSA 200406-16 (Apache)
10076| [54590] Gentoo Security Advisory GLSA 200406-05 (Apache)
10077| [54582] Gentoo Security Advisory GLSA 200405-22 (Apache)
10078| [54529] Gentoo Security Advisory GLSA 200403-04 (Apache)
10079| [54499] Gentoo Security Advisory GLSA 200310-04 (Apache)
10080| [54498] Gentoo Security Advisory GLSA 200310-03 (Apache)
10081| [54439] FreeBSD Ports: apache
10082| [53931] Slackware Advisory SSA:2004-133-01 apache
10083| [53903] Slackware Advisory SSA:2004-299-01 apache, mod_ssl, php
10084| [53902] Slackware Advisory SSA:2004-305-01 apache+mod_ssl
10085| [53878] Slackware Advisory SSA:2003-308-01 apache security update
10086| [53851] Debian Security Advisory DSA 135-1 (libapache-mod-ssl)
10087| [53849] Debian Security Advisory DSA 132-1 (apache-ssl)
10088| [53848] Debian Security Advisory DSA 131-1 (apache)
10089| [53784] Debian Security Advisory DSA 021-1 (apache)
10090| [53738] Debian Security Advisory DSA 195-1 (apache-perl)
10091| [53737] Debian Security Advisory DSA 188-1 (apache-ssl)
10092| [53735] Debian Security Advisory DSA 187-1 (apache)
10093| [53703] Debian Security Advisory DSA 532-1 (libapache-mod-ssl)
10094| [53577] Debian Security Advisory DSA 120-1 (libapache-mod-ssl, apache-ssl)
10095| [53568] Debian Security Advisory DSA 067-1 (apache,apache-ssl)
10096| [53519] Debian Security Advisory DSA 689-1 (libapache-mod-python)
10097| [53433] Debian Security Advisory DSA 181-1 (libapache-mod-ssl)
10098| [53282] Debian Security Advisory DSA 594-1 (apache)
10099| [53248] Debian Security Advisory DSA 558-1 (libapache-mod-dav)
10100| [53224] Debian Security Advisory DSA 532-2 (libapache-mod-ssl)
10101| [53215] Debian Security Advisory DSA 525-1 (apache)
10102| [53151] Debian Security Advisory DSA 452-1 (libapache-mod-python)
10103| [52529] FreeBSD Ports: apache+ssl
10104| [52501] FreeBSD Ports: apache
10105| [52461] FreeBSD Ports: apache
10106| [52390] FreeBSD Ports: apache
10107| [52389] FreeBSD Ports: apache
10108| [52388] FreeBSD Ports: apache
10109| [52383] FreeBSD Ports: apache
10110| [52339] FreeBSD Ports: apache+mod_ssl
10111| [52331] FreeBSD Ports: apache
10112| [52329] FreeBSD Ports: ru-apache+mod_ssl
10113| [52314] FreeBSD Ports: apache
10114| [52310] FreeBSD Ports: apache
10115| [15588] Detect Apache HTTPS
10116| [15555] Apache mod_proxy content-length buffer overflow
10117| [15554] Apache mod_include priviledge escalation
10118| [14771] Apache <= 1.3.33 htpasswd local overflow
10119| [14177] Apache mod_access rule bypass
10120| [13644] Apache mod_rootme Backdoor
10121| [12293] Apache Input Header Folding and mod_ssl ssl_io_filter_cleanup DoS Vulnerabilities
10122| [12280] Apache Connection Blocking Denial of Service
10123| [12239] Apache Error Log Escape Sequence Injection
10124| [12123] Apache Tomcat source.jsp malformed request information disclosure
10125| [12085] Apache Tomcat servlet/JSP container default files
10126| [11438] Apache Tomcat Directory Listing and File disclosure
10127| [11204] Apache Tomcat Default Accounts
10128| [11092] Apache 2.0.39 Win32 directory traversal
10129| [11046] Apache Tomcat TroubleShooter Servlet Installed
10130| [11042] Apache Tomcat DOS Device Name XSS
10131| [11041] Apache Tomcat /servlet Cross Site Scripting
10132| [10938] Apache Remote Command Execution via .bat files
10133| [10839] PHP.EXE / Apache Win32 Arbitrary File Reading Vulnerability
10134| [10773] MacOS X Finder reveals contents of Apache Web files
10135| [10766] Apache UserDir Sensitive Information Disclosure
10136| [10756] MacOS X Finder reveals contents of Apache Web directories
10137| [10752] Apache Auth Module SQL Insertion Attack
10138| [10704] Apache Directory Listing
10139| [10678] Apache /server-info accessible
10140| [10677] Apache /server-status accessible
10141| [10440] Check for Apache Multiple / vulnerability
10142|
10143| SecurityTracker - https://www.securitytracker.com:
10144| [1028865] Apache Struts Bugs Permit Remote Code Execution and URL Redirection Attacks
10145| [1028864] Apache Struts Wildcard Matching and Expression Evaluation Bugs Let Remote Users Execute Arbitrary Code
10146| [1028824] Apache mod_dav_svn URI Processing Flaw Lets Remote Users Deny Service
10147| [1028823] Apache Unspecified Flaw in mod_session_dbd Has Unspecified Impact
10148| [1028724] (HP Issues Fix for HP-UX) Apache Web Server Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
10149| [1028722] (Red Hat Issues Fix for JBoss) Apache Tomcat Lets Remote Users Conduct DIGEST Authentication Replay Attacks
10150| [1028693] (Red Hat Issues Fix) Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks
10151| [1028622] Apache Struts 'includeParams' Bugs Permit Remote Command Execution and Cross-Site Scripting Attacks
10152| [1028621] Apache Subversion Bugs Let Remote Authenticated Users Execute Arbitrary Commands and Deny Service
10153| [1028540] Apache mod_rewrite Input Validation Flaw Lets Remote Users Execute Arbitrary Commands
10154| [1028534] Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks
10155| [1028533] Apache Tomcat Lack of Chunked Transfer Encoding Extension Size Limit Lets Remote Users Deny Service
10156| [1028532] Apache Tomcat AsyncListeners Bug May Disclose Information from One Request to Another User
10157| [1028515] Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
10158| [1028457] Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information
10159| [1028287] Apache CXF WSS4JInInterceptor Grants Service Access to Remote Users
10160| [1028286] Apache CXF WS-Security UsernameToken Processing Flaw Lets Remote Users Bypass Authentication
10161| [1028252] Apache Commons FileUpload Unsafe Temporary File Lets Local Users Gain Elevated Privileges
10162| [1028207] Apache Input Validation Bugs Permit Cross-Site Scripting Attacks
10163| [1027836] Apache Tomcat Connection Processing Bug Lets Remote Users Deny Service
10164| [1027834] Apache Tomcat Bug Lets Remote Users Bypass Cross-Site Request Forgery Prevention Filter
10165| [1027833] Apache Tomcat Bug Lets Remote Users Bypass Security Constraints
10166| [1027729] Apache Tomcat Header Processing Bug Lets Remote Users Deny Service
10167| [1027728] Apache Tomcat Lets Remote Users Conduct DIGEST Authentication Replay Attacks
10168| [1027554] Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions
10169| [1027508] Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks
10170| [1027421] Apache Web Server Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
10171| [1027096] Apache Commons Compress BZip2CompressorOutputStream() Sorting Algorithm Lets Remote or Local Users Deny Service
10172| [1026932] Apache LD_LIBRARY_PATH Processing Lets Local Users Gain Elevated Privileges
10173| [1026928] Apache OFBiz Unspecified Flaw Lets Remote Users Execute Arbitrary Code
10174| [1026927] Apache OFBiz Input Validation Flaws Permit Cross-Site Scripting Attacks
10175| [1026847] Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service
10176| [1026846] Apache Wicket Discloses Hidden Application Files to Remote Users
10177| [1026839] Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks
10178| [1026616] Apache Bugs Let Remote Users Deny Service and Obtain Cookie Data
10179| [1026575] Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands
10180| [1026484] Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code
10181| [1026477] Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service
10182| [1026402] Apache Struts Conversion Error Lets Remote Users Inject Arbitrary Commands
10183| [1026353] Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers
10184| [1026295] Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges
10185| [1026267] Apache .htaccess File Integer Overflow Lets Local Users Execute Arbitrary Code
10186| [1026144] Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers
10187| [1026095] Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks
10188| [1026054] Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service
10189| [1025993] Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information
10190| [1025976] Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks
10191| [1025960] Apache httpd Byterange Filter Processing Error Lets Remote Users Deny Service
10192| [1025925] Apache Tomcat Commons Daemon jsvc Lets Local Users Gain Elevated Privileges
10193| [1025924] Apache Tomcat XML Validation Flaw Lets Applications Obtain Potentially Sensitive Information
10194| [1025788] Apache Tomcat Lets Malicious Applications Obtain Information and Deny Service
10195| [1025755] Apache Santuario Buffer Overflow Lets Remote Users Deny Service
10196| [1025712] Apache Tomcat Discloses Passwords to Local Users in Certain Cases
10197| [1025577] Apache Archiva Input Validation Hole Permits Cross-Site Scripting Attacks
10198| [1025576] Apache Archiva Request Validation Flaw Permits Cross-Site Request Forgery Attacks
10199| [1025527] Apache APR Library apr_fnmatch() Flaw Lets Remote Users Execute Arbitrary Code
10200| [1025303] Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users
10201| [1025215] Apache Tomcat May Ignore @ServletSecurity Annotation Protections
10202| [1025066] Apache Continuum Input Validation Flaw Permits Cross-Site Request Forgery Attacks
10203| [1025065] Apache Continuum Input Validation Hole Permits Cross-Site Scripting Attacks
10204| [1025027] Apache Tomcat maxHttpHeaderSize Parsing Error Lets Remote Users Deny Service
10205| [1025026] Apache Tomcat Manager Input Validation Hole Permits Cross-Site Scripting Attacks
10206| [1025025] Apache Tomcat Security Manager Lets Local Users Bypass File Permissions
10207| [1024764] Apache Tomcat Manager Input Validation Hole in 'sessionList.jsp' Permits Cross-Site Scripting Attacks
10208| [1024417] Apache Traffic Server Insufficient Randomization Lets Remote Users Poison the DNS Cache
10209| [1024332] Apache mod_cache and mod_dav Request Processing Flaw Lets Remote Users Deny Service
10210| [1024180] Apache Tomcat 'Transfer-Encoding' Header Processing Flaw Lets Remote Users Deny Service and Obtain Potentially Sensitive Information
10211| [1024096] Apache mod_proxy_http May Return Results for a Different Request
10212| [1023942] Apache mod_proxy_ajp Error Condition Lets Remote Users Deny Service
10213| [1023941] Apache ap_read_request() Memory Error May Let Remote Users Access Potentially Sensitive Information
10214| [1023778] Apache ActiveMQ Input Validation Flaw Permits Cross-Site Scripting Attacks
10215| [1023701] Apache mod_isapi Error Processing Flaw May Let Remote Users Deny Service
10216| [1023533] Apache mod_proxy Integer Overflow May Let Remote Users Execute Arbitrary Code
10217| [1022988] Apache Solaris Support Code Bug Lets Remote Users Deny Service
10218| [1022529] Apache mod_deflate Connection State Bug Lets Remote Users Deny Service
10219| [1022509] Apache mod_proxy stream_reqbody_cl() Infinite Loop Lets Remote Users Deny Service
10220| [1022296] Apache IncludesNoExec Options Restrictions Can Be Bypass By Local Users
10221| [1022264] Apache mod_proxy_ajp Bug May Disclose Another User's Response Data
10222| [1022001] Apache Tomcat mod_jk May Disclose Responses to the Wrong User
10223| [1021988] mod_perl Input Validation Flaw in Apache::Status and Apache2::Status Permits Cross-Site Scripting Attacks
10224| [1021350] NetWare Bug Lets Remote Users Access the ApacheAdmin Console
10225| [1020635] Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks
10226| [1020520] Oracle WebLogic Apache Connector Lets Remote Users Execute Arbitrary Code
10227| [1020267] Apache mod_proxy Interim Response Process Bug Lets Remote Users Deny Service
10228| [1019784] Apache-SSL Certificate Processing Bug May Let Remote Users View Portions of Kernel Memory
10229| [1019256] Apache mod_negotiation Input Validation Hole Permits Cross-Site Scripting Attacks
10230| [1019194] Apache Input Validation Hole in Mod_AutoIndex When the Character Set is Undefined May Permit Cross-Site Scripting Attacks
10231| [1019185] Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks
10232| [1019154] Apache Input Validation Hole in mod_status Permits Cross-Site Scripting Attacks
10233| [1019093] Apache Input Validation Hole in mod_imap Permits Cross-Site Scripting Attacks
10234| [1019030] Apache Input Validation Hole in Default HTTP 413 Error Page Permits Cross-Site Scripting Attacks
10235| [1018633] Apache mod_proxy Bug Lets Remote Users Deny Service
10236| [1018304] Apache HTTPD scoreboard Protection Flaw Lets Local Users Terminate Arbitrary Processes
10237| [1018303] Apache HTTPD mod_cache May Let Remote Users Deny Service
10238| [1018302] Apache mod_status Input Validation Hole Permits Cross-Site Scripting Attacks
10239| [1018269] Apache Tomcat Input Validation Hole in Processing Accept-Language Header Permits Cross-Site Scripting Attacks
10240| [1017904] Apache suEXEC Bugs May Let Local Users Gain Elevated Privileges
10241| [1017719] Apache Tomcat JK Web Server Connector Buffer Overflow in map_uri_to_worker() Lets Remote Users Execute Arbitrary Code
10242| [1017062] Apache mod_tcl Format String Bug in set_var() Function May Let Remote Users Execute Arbitrary Code
10243| [1016601] Apache mod_rewrite Off-by-one Error Lets Remote Users Execute Arbitrary Code
10244| [1016576] Apache Tomcat Discloses Directory Listings to Remote Users
10245| [1015447] Apache mod_ssl Null Pointer Dereference May Let Remote Users Deny Service
10246| [1015344] Apache mod_imap Input Validation Flaw in Referer Field Lets Remote Users Conduct Cross-Site Scripting Attacks
10247| [1015093] Apache Memory Leak in MPM 'worker.c' Code May Let Remote Users Deny Service
10248| [1014996] ApacheTop Unsafe Temporary File May Let Local Users Gain Elevated Privileges
10249| [1014833] Apache ssl_hook_Access() Function May Fail to Verify Client Certificates
10250| [1014826] Apache Memory Leak in 'byterange filter' Lets Remote Users Deny Service
10251| [1014575] Apache mod_ssl Off-by-one Buffer Overflow in Processing CRLs May Let Remote Users Deny Service
10252| [1014323] Apache Chunked Transfer-Encoding and Content-Length Processing Lets Remote Users Smuggle HTTP Requests
10253| [1013156] Apache mod_python Publisher Handler Discloses Information to Remote Users
10254| [1012829] Apache mod_auth_radius radcpy() Integer Overflow Lets Remote Users Deny Service in Certain Cases
10255| [1012416] Apache on Apple OS X Lets Remote Users Bypass Apache File Handlers and Directly Access Files
10256| [1012415] Apache on Apple HFS+ Filesystems May Disclose '.DS_Store' Files to Remote Users
10257| [1012414] Apache mod_digest_apple Lets Remote Users Replay Authentication Credentials
10258| [1012083] Apache Web Server Error in Processing Requests With Many Space Characters Lets Remote Users Deny Service
10259| [1011783] Apache mod_include Buffer Overflow Lets Local Users Execute Arbitrary Code
10260| [1011557] Apache mod_ssl SSLCipherSuite Directive Can By Bypassed in Certain Cases
10261| [1011385] Apache Satsify Directive Error May Let Remote Users Access Restricted Resources
10262| [1011340] Apache SSL Connection Abort State Error Lets Remote Users Deny Service
10263| [1011303] Apache ap_resolve_env() Buffer Overflow in Reading Configuration Files May Let Local Users Gain Elevated Privileges
10264| [1011299] Apache IPv6 Address Parsing Flaw May Let Remote Users Deny Service
10265| [1011248] Apache mod_dav LOCK Method Error May Let Remote Users Deny Service
10266| [1011213] Apache mod_ssl Can Be Crashed By Remote Users When Reverse Proxying SSL Connections
10267| [1010674] Apache Can Be Crashed By PHP Code Invoking Nested Remote Sockets
10268| [1010599] Apache httpd Header Line Memory Allocation Lets Remote Users Crash the Server
10269| [1010462] Apache mod_proxy Buffer Overflow May Let Remote Users Execute Arbitrary Code
10270| [1010322] Apache mod_ssl Stack Overflow in ssl_util_uuencode_binary() May Let Remote Users Execute Arbitrary Code
10271| [1010270] cPanel Apache mod_phpsuexec Options Let Local Users Gain Elevated Privileges
10272| [1009934] Apache Web Server Has Buffer Overflow in ebcdic2ascii() on Older Processor Architectures
10273| [1009516] Apache mod_survey HTML Report Format Lets Remote Users Conduct Cross-Site Scripting Attacks
10274| [1009509] Apache mod_disk_cache Stores Authentication Credentials on Disk
10275| [1009495] Apache Web Server Socket Starvation Flaw May Let Remote Users Deny Service
10276| [1009417] GroupWise WebAccess With Apache on NetWare Has Configuration Flaw That May Grant Web Access to Remote Users
10277| [1009338] Apache mod_access Parsing Flaw May Fail to Enforce Allow/Deny Rules
10278| [1009337] Apache mod_ssl Memory Leak Lets Remote Users Crash the Daemon
10279| [1009182] Apache for Cygwin '..%5C' Input Validation Flaw Discloses Files to Remote Users
10280| [1008973] PHP May Apply Incorrect php_admin_* Settings To Requests for Apache Virtual Hosts
10281| [1008967] Apache-SSL 'SSLFakeBasicAuth' Lets Remote Users Forge Client Certificates to Be Authenticated
10282| [1008920] Apache mod_digest May Validate Replayed Client Responses
10283| [1008828] Apache mod_python String Processing Bug Still Lets Remote Users Crash the Web Server
10284| [1008822] Apache mod_perl File Descriptor Leak May Let Local Users Hijack the http and https Services
10285| [1008675] mod_auth_shadow Apache Module Authenticates Expired Passwords
10286| [1008559] Apache mod_php File Descriptor Leak May Let Local Users Hijack the https Service
10287| [1008335] Apache mod_python String Processing Bug Lets Remote Users Crash the Web Server
10288| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
10289| [1008030] Apache mod_rewrite Contains a Buffer Overflow
10290| [1008029] Apache mod_alias Contains a Buffer Overflow
10291| [1008028] Apache mod_cgid May Disclose CGI Output to Another Client
10292| [1007995] Apache Cocoon Forms May Let Remote Users Execute Arbitrary Java Code on the System
10293| [1007993] Apache Cocoon 'view-source' Sample Script Discloses Files to Remote Users
10294| [1007823] Apache Web Server mod_cgi Error May Let Malicious CGI Scripts Crash the Web Service
10295| [1007664] Apache::Gallery Unsafe Temporary Files May Let Local Users Gain Apache Web Server Privileges
10296| [1007557] Apache Web Server Does Not Filter Terminal Escape Sequences From Log Files
10297| [1007230] Apache HTTP Server 'rotatelogs' Bug on Win32 and OS/2 May Cause the Logging to Stop
10298| [1007146] Apache HTTP Server FTP Proxy Bug May Cause Denial of Service Conditions
10299| [1007145] Apache 'accept()' Errors May Cause Denial of Service Conditions
10300| [1007144] Apache Web Server 'type-map' File Error Permits Local Denial of Service Attacks
10301| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
10302| [1006864] Apache Web Server Can Be Crashed By Remote Users Via mod_dav Flaws and Also Via Basic Authentication
10303| [1006709] Apache mod_survey Input Validation Flaw Lets Remote Users Fill Up Disk Space
10304| [1006614] Apache mod_ntlm Buffer Overflow and Format String Flaw Let Remote Users Execute Arbitary Code
10305| [1006591] Apache mod_access_referer Module Null Pointer Dereference May Faciliate Denial of Service Attacks
10306| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
10307| [1006021] Apache Tomcat Server URL Parsing Error May Disclose Otherwise Inaccessible Web Directory Listings and Files to Remote Users
10308| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
10309| [1005962] Apache Web Server Path Parsing Flaw May Allow Remote Users to Execute Code in Certain Configurations
10310| [1005848] Apache 'printenv' Script Input Validation Bugs in Older Versions May Let Remote Users Conduct Cross-Site Scripting Attacks
10311| [1005765] Apache mod_jk Module Processing Bug When Used With Tomcat May Disclose Information to Remote Users or Crash
10312| [1005548] Apache mod_php Module May Allow Local Users to Gain Control of the Web Port
10313| [1005499] Apache Web Server (2.0.42) May Disclose CGI Source Code to Remote Users When Used With WebDAV
10314| [1005410] Apache Tomcat Java Servlet Engine Can Be Crashed Via Multiple Requests for DOS Device Names
10315| [1005351] Apache Web Server (1.3.x) Shared Memory Scoreboard Bug Lets Certain Local Users Issue Signals With Root Privileges
10316| [1005331] Apache Web Server (2.x) SSI Server Signature Filtering Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
10317| [1005290] Apache Tomcat Java Server Default Servlet Returns JSP Source Code to Remote Users
10318| [1005285] Apache Web Server 'mod_dav' Has Null Pointer Bug That May Allow Remote Users to Cause Denial of Service Conditions
10319| [1005010] Apache Web Server (2.0) Has Unspecified Flaw That Allows Remote Users to Obtain Sensitive Data and Cause Denial of Service Conditions
10320| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
10321| [1004745] Apache Tomcat Java Server Allows Cross-Site Scripting Attacks
10322| [1004636] Apache mod_ssl 'Off-by-One' Bug May Let Local Users Crash the Web Server or Possibly Execute Arbitrary Code
10323| [1004602] Apache Tomcat Java Server for Windows Can Be Crashed By Remote Users Sending Malicious Requests to Hang All Available Working Threads
10324| [1004586] Apache Tomcat Java Server May Disclose the Installation Path to Remote Users
10325| [1004555] Apache Web Server Chunked Encoding Flaw May Let Remote Users Execute Arbitrary Code on the Server
10326| [1004209] Apache 'mod_python' Python Language Interpreter Bug in Publisher Handler May Allow Remote Users to Modify Files on the System
10327| [1003874] Apache Web Server for Windows Has Batch File Processing Hole That Lets Remote Users Execute Commands on the System
10328| [1003767] 'mod_frontpage' Module for Apache Web Server Has Buffer Overlow in 'fpexec.c' That Allows Remote Users to Execute Arbitrary Code on the System with Root Privileges
10329| [1003723] Apache-SSL for Apache Web Server Has Buffer Overflow That Can Be Triggered By Remote Users
10330| [1003664] 'mod_ssl' Security Package for Apache Web Server Has Buffer Overflow That Can Be Triggered By Remote Users
10331| [1003602] GNUJSP Java Server Pages Implementation Discloses Web Files and Source Code to Remote Users and Bypasses Apache Access Control Restrictions
10332| [1003465] PHP for Apache Web Server May Disclose Installation Path Information to Remote Users Making 'OPTIONS' Requests
10333| [1003451] Oracle Application Server PL/SQL Module for Apache Has Buffer Overflows That Allow Remote Users to Execute Arbitrary Code and Gain Access to the Server
10334| [1003131] Apache Web Server in Virtual Hosting Mode Can Be Crashed By a Local User Removing a Log Directory
10335| [1003104] PHP.EXE Windows CGI for Apache Web Server May Let Remote Users View Files on the Server Due to Configuration Error
10336| [1003008] Apache 'mod_bf' Module Lets Remote Users Execute Arbitrary Code
10337| [1002629] Apache suEXEC Wrapper Fails to Observe Minimum Group ID Security Settings in Certain Situations
10338| [1002542] Apache Web Server Virtual Hosting Split-Logfile Function Lets Remote Users Write Log Entries to Arbitrary Files on the System
10339| [1002400] Apache mod_gzip Module Has Buffer Overflow That Can Be Exploited By Local Users to Gain Elevated Privileges
10340| [1002303] Several 3rd Party Apache Authentication Modules Allow Remote Users to Execute Arbitrary Code to Gain Access to the System or Execute Stored Procedures to Obtain Arbitrary Database Information
10341| [1002188] Apache Web Server Discloses Internal IP Addresses to Remote Users in Certain Configurations
10342| [1001989] Apache Web Server May Disclose Directory Contents Even If an Index.html File is Present in the Directory
10343| [1001719] Apache Web Server on Mac OS X Client Fails to Enforce File and Directory Access Protections, Giving Remote Users Access to Restricted Pages
10344| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
10345| [1001304] Apache Web Server for Windows Lets Remote Users Crash the Web Server Application
10346| [1001083] Apache Web Server May Display Directory Index Listings Even if Directory Listings Are Disabled
10347|
10348| OSVDB - http://www.osvdb.org:
10349| [96078] Apache CloudStack Infrastructure Menu Setup Network Multiple Field XSS
10350| [96077] Apache CloudStack Global Settings Multiple Field XSS
10351| [96076] Apache CloudStack Instances Menu Display Name Field XSS
10352| [96075] Apache CloudStack Instances Menu Add Instances Network Name Field XSS
10353| [96074] Apache CloudStack Instances Menu Add Instances Review Step Multiple Field XSS
10354| [96031] Apache HTTP Server suEXEC Symlink Arbitrary File Access
10355| [95888] Apache Archiva Single / Double Quote Character Handling XSS Weakness
10356| [95885] Apache Subversion mod_dav_svn Module Crafted HTTP Request Handling Remote DoS
10357| [95706] Apache OpenOffice.org (OOo) OOXML Document File XML Element Handling Memory Corruption
10358| [95704] Apache OpenOffice.org (OOo) DOC File PLCF Data Handling Memory Corruption
10359| [95603] Apache Continuum web/util/GenerateRecipentNotifier.java recipient Parameter XSS
10360| [95602] Apache Continuum web/action/notifier/JabberProjectNotifierEditAction-jabberProjectNotifierSave-validation.xml Multiple Parameter XSS
10361| [95601] Apache Continuum web/action/notifier/JabberGroupNotifierEditAction-jabberProjectGroupNotifierSave-validation.xml Multiple Parameter XSS
10362| [95600] Apache Continuum web/action/ScheduleAction-saveSchedule-validation.xml Multiple Parameter XSS
10363| [95599] Apache Continuumweb/action/BuildDefinitionAction-saveBuildDefinition-validation.xml Multiple Parameter XSS
10364| [95598] Apache Continuum web/action/AddProjectAction-addProject-validation.xml Multiple Parameter XSS
10365| [95597] Apache Continuum web/action/ProjectEditAction-projectSave-validation.xml Multiple Parameter XSS
10366| [95596] Apache Continuum web/action/notifier/IrcGroupNotifierEditAction-ircProjectGroupNotifierSave-validation.xml Multiple Parameter XSS
10367| [95595] Apache Continuum web/action/notifier/IrcProjectNotifierEditAction-ircProjectNotifierSave-validation.xml Multiple Parameter XSS
10368| [95594] Apache Continuum web/action/ProjectGroupAction.java Multiple Parameter XSS
10369| [95593] Apache Continuum web/action/AddProjectGroupAction.java Multiple Parameter XSS
10370| [95592] Apache Continuum web/action/AddProjectAction.java Multiple Parameter XSS
10371| [95523] Apache OFBiz Webtools Application View Log Screen Unspecified XSS
10372| [95522] Apache OFBiz Nested Expression Evaluation Arbitrary UEL Function Execution
10373| [95521] Apache HTTP Server mod_session_dbd Session Saving Unspecified Issue
10374| [95498] Apache HTTP Server mod_dav.c Crafted MERGE Request Remote DoS
10375| [95406] Apache Struts DefaultActionMapper Multiple Prefixing Parameters Arbitrary Site Redirect
10376| [95405] Apache Struts DefaultActionMapper Multiple Prefixing Parameters Remote Code Execution
10377| [95011] Apache CXF XML Parser SOAP Message Handling CPU Resource Exhaustion Remote DoS
10378| [94705] Apache Geronimo RMI Classloader Exposure Serialized Object Handling Remote Code Execution
10379| [94651] Apache Santuario (XML Security for C++) XML Signature CanonicalizationMethod Parameter Spoofing Weakness
10380| [94636] Apache Continuum workingCopy.action userDirectory Traversal Arbitrary File Access
10381| [94635] Apache Maven SCM SvnCommandlineUtils Process Listing Local Password Disclosure
10382| [94632] Apache Maven Wagon SSH (wagon-ssh) Host Verification Failure MitM Weakness
10383| [94625] Apache Santuario (XML Security for C++) XML Signature Reference Crafted XPointer Expression Handling Heap Buffer Overflow
10384| [94618] Apache Archiva /archiva/security/useredit.action username Parameter XSS
10385| [94617] Apache Archiva /archiva/security/roleedit.action name Parameter XSS
10386| [94616] Apache Archiva /archiva/security/userlist!show.action roleName Parameter XSS
10387| [94615] Apache Archiva /archiva/deleteArtifact!doDelete.action groupId Parameter XSS
10388| [94614] Apache Archiva /archiva/admin/addLegacyArtifactPath!commit.action legacyArtifactPath.path Parameter XSS
10389| [94613] Apache Archiva /archiva/admin/addRepository.action Multiple Parameter XSS
10390| [94612] Apache Archiva /archiva/admin/editAppearance.action Multiple Parameter XSS
10391| [94611] Apache Archiva /archiva/admin/addLegacyArtifactPath.action Multiple Parameter XSS
10392| [94610] Apache Archiva /archiva/admin/addNetworkProxy.action Multiple Parameter XSS
10393| [94403] Apache Santuario (XML Security for C++) InclusiveNamespace PrefixList Processing Heap Overflow
10394| [94402] Apache Santuario (XML Security for C++) HMAC-based XML Signature Processing DoS
10395| [94401] Apache Santuario (XML Security for C++) XPointer Evaluation Stack Overflow
10396| [94400] Apache Santuario (XML Security for C++) HMAC-Based XML Signature Reference Element Validation Spoofing Weakness
10397| [94279] Apache Qpid CA Certificate Validation Bypass
10398| [94275] Apache Solr JettySolrRunner.java Can Not Find Error Message XSS
10399| [94233] Apache OpenJPA Object Deserialization Arbitrary Executable Creation
10400| [94042] Apache Axis JAX-WS Java Unspecified Exposure
10401| [93969] Apache Struts OGNL Expression Handling Double Evaluation Error Remote Command Execution
10402| [93796] Apache Subversion Filename Handling FSFS Repository Corruption Remote DoS
10403| [93795] Apache Subversion svnserve Server Aborted Connection Message Handling Remote DoS
10404| [93794] Apache Subversion contrib/hook-scripts/check-mime-type.pl svnlook Hyphenated argv Argument Handling Remote DoS
10405| [93793] Apache Subversion contrib/hook-scripts/svn-keyword-check.pl Filename Handling Remote Command Execution
10406| [93646] Apache Struts Crafted Parameter Arbitrary OGNL Code Execution
10407| [93645] Apache Struts URL / Anchor Tag includeParams Attribute Remote Command Execution
10408| [93636] Apache Pig Multiple Physical Operator Memory Exhaustion Remote Remote DoS
10409| [93635] Apache Wink DTD (Document Type Definition) Expansion Data Parsing Information Disclosure
10410| [93605] RT Apache::Session::File Session Replay Reuse Information Disclosure
10411| [93599] Apache Derby SYSCS_UTIL.SYSCS_SET_DATABASE_PROPERTY Boot Password Manipulation Re-encryption Failure Password Corruption
10412| [93555] Apache Commons Codec Invalid Base32 String Information Tunneling Weakness
10413| [93554] Apache HBase bulkLoadHFiles() Method ACL Bypass
10414| [93543] JBoss Enterprise Application Platform org.apache.catalina.connector.Response.encodeURL() Method MitM jsessionid Disclosure
10415| [93542] Apache ManifoldCF (Connectors Framework) org.apache.manifoldcf.crawler.ExportConfiguration Class Configuration Export Password Disclosure
10416| [93541] Apache Solr json.wrf Callback XSS
10417| [93524] Apache Hadoop GetSecurityDescriptorControl() Function Absolute Security Descriptor Handling NULL Descriptor Weakness
10418| [93521] Apache jUDDI Security API Token Session Persistence Weakness
10419| [93520] Apache CloudStack Default SSL Key Weakness
10420| [93519] Apache Shindig /ifr Cross-site Arbitrary Gadget Invocation
10421| [93518] Apache Solr /admin/analysis.jsp name Parameter XSS
10422| [93517] Apache CloudStack setup-cloud-management /etc/sudoers Modification Local Privilege Escalation
10423| [93516] Apache CXF UsernameTokenInterceptor Nonce Caching Replay Weakness
10424| [93515] Apache HBase table.jsp name Parameter XSS
10425| [93514] Apache CloudStack Management Server Unauthenticated Remote JMX Connection Default Setting Weakness
10426| [93463] Apache Struts EL / OGNL Interpretation Unspecified Remote Code Execution
10427| [93462] Apache CXF WS-SecurityPolicy AlgorithmSuite Arbitrary Ciphertext Decryption Weakness
10428| [93401] Apache Hadoop core-site.xml Permission Weakness Local Alfredo Secret Disclosure
10429| [93400] Apache Hadoop Map/Reduce Job Log Directory Symlink Arbitrary File Mode Manipulation
10430| [93397] Apache Wicket Referrer HTTP Header Session ID Disclosure
10431| [93366] Apache HTTP Server modules/mappers/mod_rewrite.c do_rewritelog() Function Log File Terminal Escape Sequence Filtering Remote Command Execution
10432| [93254] Apache Tomcat AsyncListener Method Cross-session Information Disclosure
10433| [93253] Apache Tomcat Chunked Transfer Encoding Data Saturation Remote DoS
10434| [93252] Apache Tomcat FORM Authenticator Session Fixation
10435| [93172] Apache Camel camel/endpoints/ Endpoint XSS
10436| [93171] Apache Sling HtmlResponse Error Message XSS
10437| [93170] Apache Directory DelegatingAuthenticator MitM Spoofing Weakness
10438| [93169] Apache Wave AuthenticationServlet.java Session Fixation Weakness
10439| [93168] Apache Click ErrorReport.java id Parameter XSS
10440| [93167] Apache ActiveMQ JMSXUserId Spoofing Weakness
10441| [93166] Apache CXF Crafted Message Element Count Handling System Resource Exhaustion Remote DoS
10442| [93165] Apache CXF Crafted Message Element Level Handling System Resource Exhaustion Remote DoS
10443| [93164] Apache Harmony DatagramSocket Class connect Method CheckAccept() IP Blacklist Bypass
10444| [93163] Apache Hadoop Map/Reduce Daemon Symlink Arbitrary File Overwrite
10445| [93162] Apache VelocityStruts struts/ErrorsTool.getMsgs Error Message XSS
10446| [93161] Apache CouchDB Rewriter VM Atom Table Memory Exhaustion Remote DoS
10447| [93158] Apache Wicket BookmarkablePageLink Feature XSS CSRF
10448| [93157] Apache Struts UrlHelper.java s:url includeParams Functionality XSS
10449| [93156] Apache Tapestry Calendar Component datefield.js datefield Parameter XSS
10450| [93155] Apache Struts fielderror.ftl fielderror Parameter Error Message XSS
10451| [93154] Apache JSPWiki Edit.jsp createPages WikiPermission Bypass
10452| [93153] Apache PDFBox PDFXrefStreamParser Missing Element Handling PDF Parsing DoS
10453| [93152] Apache Hadoop HttpServer.java Multiple Function XSS
10454| [93151] Apache Shiro Search Filter userName Parameter LDAP Code Injection Weakness
10455| [93150] Apache Harmony java.net.SocketPermission Class boolean equals Function checkConnect() Weakness Host Name Retrieval
10456| [93149] Apache Harmony java.security.Provider Class void load Function checkSecurityAccess() Weakness
10457| [93148] Apache Harmony java.security.ProtectionDomain Class java.lang.String.toString() Function checkPermission() Weakness
10458| [93147] Apache Harmony java.net.URLConnection openConnection Function checkConnect Weakness Proxy Connection Permission Bypass
10459| [93146] Apache Harmony java.net.ServerSocket Class void implAccept Function checkAccept() Weakness SerSocket Subclass Creation
10460| [93145] Apache Qpid JMS Client Detached Session Frame Handling NULL Pointer Dereference Remote DoS
10461| [93144] Apache Solr Admin Command Execution CSRF
10462| [93009] Apache VCL XMLRPC API Unspecified Function Remote Privilege Escalation
10463| [93008] Apache VCL Web GUI Unspecified Remote Privilege Escalation
10464| [92997] Apache Commons Codec org.apache.commons.codec.net.URLCodec Fields Missing 'final' Thread-safety Unspecified Issue
10465| [92976] Apache ActiveMQ scheduled.jsp crontab Command XSS
10466| [92947] Apache Commons Codec org.apache.commons.codec.language.Soundex.US_ENGLISH_MAPPING Missing MS_PKGPROTECT Field Manipulation Unspecified Issue
10467| [92749] Apache CloudStack Predictable Hash Virtual Machine Console Console Access URL Generation
10468| [92748] Apache CloudStack VM Console Access Restriction Bypass
10469| [92709] Apache ActiveMQ Web Console Unauthenticated Remote Access
10470| [92708] Apache ActiveMQ Sample Web Application Broker Resource Consumption Remote DoS
10471| [92707] Apache ActiveMQ webapp/websocket/chat.js Subscribe Message XSS
10472| [92706] Apache ActiveMQ Debug Log Rendering XSS
10473| [92705] Apache ActiveMQ PortfolioPublishServlet.java refresh Parameter XSS
10474| [92270] Apache Tomcat Unspecified CSRF
10475| [92094] Apache Subversion mod_dav_svn Module Nonexistent URL Lock Request Handling NULL Pointer Dereference Remote DoS
10476| [92093] Apache Subversion mod_dav_svn Module Activity URL PROPFIND Request Handling NULL Pointer Dereference Remote DoS
10477| [92092] Apache Subversion mod_dav_svn Module Log REPORT Request Handling NULL Pointer Dereference Remote DoS
10478| [92091] Apache Subversion mod_dav_svn Module Node Property Handling Resource Exhaustion Remote DoS
10479| [92090] Apache Subversion mod_dav_svn Module Activity URL Lock Request Handling NULL Pointer Dereference Remote DoS
10480| [91774] Apache Commons Codec Unspecified Non-private Field Manipulation Weakness
10481| [91628] mod_ruid2 for Apache HTTP Server fchdir() Inherited File Descriptor chroot Restriction Bypass
10482| [91328] Apache Wicket $up$ Traversal Arbitrary File Access
10483| [91295] Apple Mac OS X Apache Unicode Character URI Handling Authentication Bypass
10484| [91235] Apache Rave /app/api/rpc/users/get User Object Hashed Password Remote Disclosure
10485| [91185] Munin Default Apache Configuration Permission Weakness Remote Information Disclosure
10486| [91173] Apache Wicket WebApplicationPath Constructor Bypass /WEB-INF/ Directory File Access
10487| [91172] Apache Wicket PackageResourceGuard File Extension Filter Bypass
10488| [91025] Apache Qpid qpid::framing::Buffer Class Multiple Method Out-of-bounds Access Remote DoS
10489| [91024] Apache Qpid federation_tag Attribute Handling Federated Interbroker Link Access Restriction Bypass
10490| [91023] Apache Qpid AMQP Type Decoder Exposure Array Size Value Handling Memory Consumption Remote DoS
10491| [91022] Apache Qpid qpid/cpp/include/qpid/framing/Buffer.h qpid::framing::Buffer::checkAvailable() Function Integer Overflow
10492| [90986] Apache Jena ARQ INSERT DATA Request Handling Overflow
10493| [90907] Apache Subversion mod_dav_svn / libsvn_fs svn_fs_file_length() Function MKACTIVITY / PROPFIND Option Request Handling Remote DoS
10494| [90906] Apache Commons FileUpload /tmp Storage Symlink Arbitrary File Overwrite
10495| [90864] Apache Batik 1xx Redirect Script Origin Restriction Bypass
10496| [90858] Apache Ant Malformed TAR File Handling Infinite Loop DoS
10497| [90852] Apache HTTP Server for Debian apachectl /var/lock Permission Weakness Symlink Directory Permission Manipulation
10498| [90804] Apache Commons CLI Path Subversion Local Privilege Escalation
10499| [90802] Apache Avro Recursive Schema Handling Infinite Recursion DoS
10500| [90592] Apache Batik ApplicationSecurityEnforcer.java Multiple Method Security Restriction Bypass
10501| [90591] Apache Batik XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
10502| [90565] Apache Tomcat Log Directory Permission Weakness Local Information Disclosure
10503| [90564] Apache Maven / Maven Wagon SSL Certificate Validation MitM Spoofing Weakness
10504| [90557] Apache HTTP Server mod_proxy_balancer balancer-manager Interface Multiple Parameter XSS
10505| [90556] Apache HTTP Server Multiple Module Multiple Parameter XSS
10506| [90276] Apache Axis2 axis2.xml Plaintext Password Local Disclosure
10507| [90249] Apache Axiom ClassLoader XMLInputFactory / XMLOutputFactory Construction Unspecified Issue
10508| [90235] Apache Commons HttpClient Certificate Wildcard Matching Weakness
10509| [90079] Apache CXF WSS4JInInterceptor URIMappingInterceptor WS-Security SOAP Service Access Restriction Bypass
10510| [90078] Apache CXF WS-SecurityPolicy Enabled Plaintext UsernameTokens Handling Authentication Bypass
10511| [89453] Apache Open For Business Project (OFBiz) Screenlet.title Widget Attribute XSS
10512| [89452] Apache Open For Business Project (OFBiz) Image.alt Widget Attribute XSS
10513| [89294] Apache CouchDB Futon UI Browser-based Test Suite Query Parameter XSS
10514| [89293] Apache CouchDB Unspecified Traversal Arbitrary File Access
10515| [89275] Apache HTTP Server mod_proxy_ajp Module Expensive Request Parsing Remote DoS
10516| [89267] Apache CouchDB JSONP Callback Handling Unspecified XSS
10517| [89146] Apache CloudStack Master Server log4j.conf SSH Private Key / Plaintext Password Disclosure
10518| [88603] Apache OpenOffice.org (OOo) Unspecified Information Disclosure
10519| [88602] Apache OpenOffice.org (OOo) Unspecified Manifest-processing Issue
10520| [88601] Apache OpenOffice.org (OOo) Unspecified PowerPoint File Handling Issue
10521| [88285] Apache Tomcat Partial HTTP Request Saturation Remote DoS
10522| [88095] Apache Tomcat NIO Connector Terminated Connection Infinte Loop DoS
10523| [88094] Apache Tomcat FORM Authentication Crafted j_security_check Request Security Constraint Bypass
10524| [88093] Apache Tomcat Null Session Requst CSRF Prevention Filter Bypass
10525| [88043] IBM Tivoli Netcool/Reporter Apache CGI Unspecified Remote Command Execution
10526| [87580] Apache Tomcat DIGEST Authentication Session State Caching Authentication Bypass Weakness
10527| [87579] Apache Tomcat DIGEST Authentication Stale Nonce Verification Authentication Bypass Weakness
10528| [87477] Apache Tomcat Project Woodstock Service Error Page UTF-7 XSS Weakness
10529| [87227] Apache Tomcat InternalNioInputBuffer.java parseHeaders() Function Request Header Size Parsing Remote DoS
10530| [87223] Apache Tomcat DIGEST Authentication replay-countermeasure Functionality cnonce / cn Verification Authentication Bypass Weakness
10531| [87160] Apache Commons HttpClient X.509 Certificate Domain Name Matching MiTM Weakness
10532| [87159] Apache CXF X.509 Certificate Domain Name Matching MiTM Weakness
10533| [87150] Apache Axis / Axis2 X.509 Certificate Domain Name Matching MiTM Weakness
10534| [86902] Apache HTTP Server 3xx Redirect Internal IP Address Remote Disclosure
10535| [86901] Apache Tomcat Error Message Path Disclosure
10536| [86684] Apache CloudStack Unauthorized Arbitrary API Call Invocation
10537| [86556] Apache Open For Business Project (OFBiz) Unspecified Issue
10538| [86503] Visual Tools VS home/apache/DiskManager/cron/init_diskmgr Local Command Execution
10539| [86401] Apache ActiveMQ ResourceHandler Traversal Arbitrary File Access
10540| [86225] Apache Axis2 XML Signature Wrapping (XSW) Authentication Bypass
10541| [86206] Apache Axis2 Crafted SAML Assertion Signature Exclusion Attack Authentication Bypass
10542| [85722] Apache CXF SOAP Request Parsing Access Restriction Bypass
10543| [85704] Apache Qpid Incoming Client Connection Saturation Remote DoS
10544| [85474] Eucalyptus Apache Santuario (XML Security for Java) Library XML Signature Transform Handling DoS
10545| [85430] Apache mod_pagespeed Module Unspecified XSS
10546| [85429] Apache mod_pagespeed Module Hostname Verification Cross-host Resource Disclosure
10547| [85249] Apache Wicket Unspecified XSS
10548| [85236] Apache Hadoop conf/hadoop-env.sh Temporary File Symlink Arbitrary File Manipulation
10549| [85090] Apache HTTP Server mod_proxy_ajp.c mod_proxy_ajp Module Proxy Functionality Cross-client Information Disclosure
10550| [85089] Apache HTTP Server mod_proxy_http.c mod_proxy_http Module Cross-client Information Disclosure
10551| [85062] Apache Solr Autocomplete Module for Drupal Autocomplete Results XSS
10552| [85010] Apache Struts Token Handling Mechanism Token Name Configuration Parameter CSRF Weakness
10553| [85009] Apache Struts Request Parameter OGNL Expression Parsing Remote DoS
10554| [84911] libapache2-mod-rpaf X-Forward-For HTTP Header Parsing Remote DoS
10555| [84823] Apache HTTP Server Multiple Module Back End Server Error Handling HTTP Request Parsing Remote Information Disclosure
10556| [84818] Apache HTTP Server mod_negotiation Module mod_negotiation.c make_variant_list Function XSS
10557| [84562] Apache Qpid Broker Authentication Mechanism AMQP Client Shadow Connection NullAuthenticator Request Parsing Authentication Bypass
10558| [84458] Apache Libcloud SSL Certificate Validation MitM Spoofing Weakness
10559| [84279] PHP on Apache php_default_post_reader POST Request Handling Overflow DoS
10560| [84278] PHP w/ Apache PDO::ATTR_DEFAULT_FETCH_MODE / PDO::FETCH_CLASS DoS
10561| [84231] Apache Hadoop DataNodes Client BlockTokens Arbitrary Block Access
10562| [83943] Oracle Solaris Cluster Apache Tomcat Agent Subcomponent Unspecified Local Privilege Escalation
10563| [83939] Oracle Solaris Apache HTTP Server Subcomponent Unspecified Remote Information Disclosure
10564| [83685] svnauthcheck Apache HTTP Configuration File Permission Revocation Weakness
10565| [83682] Apache Sling POST Servlet @CopyFrom Operation HTTP Request Parsing Infinite Loop Remote DoS
10566| [83339] Apache Roller Blogger Roll Unspecified XSS
10567| [83270] Apache Roller Unspecified Admin Action CSRF
10568| [82782] Apache CXF WS-SecurityPolicy 1.1 SupportingToken Policy Bypass
10569| [82781] Apache CXF WS-SecurityPolicy Supporting Token Children Specification Token Signing Verification Weakness
10570| [82611] cPanel Apache Piped Log Configuration Log Message Formatting Traversal Arbitrary File Creation
10571| [82436] MapServer for Windows Bundled Apache / PHP Configuration Local File Inclusion
10572| [82215] PHP sapi/cgi/cgi_main.c apache_request_headers Function HTTP Header Handling Remote Overflow
10573| [82161] Apache Commons Compress bzip2 File Compression BZip2CompressorOutputStream Class File Handling Remote DoS
10574| [81965] Apache Batik Squiggle SVG Browser JAR File Arbitrary Code Execution
10575| [81790] Apache POI src/org/apache/poi/hwpf/model/UnhandledDataStructure.java UnhandledDataStructure() constructor Length Attribute CDF / CFBF File Handling Remote DoS
10576| [81660] Apache Qpid Credential Checking Cluster Authentication Bypass
10577| [81511] Apache for Debian /usr/share/doc HTTP Request Parsing Local Script Execution
10578| [81359] Apache HTTP Server LD_LIBRARY_PATH Variable Local Privilege Escalation
10579| [81349] Apache Open For Business Project (OFBiz) Webslinger Component Unspecified XSS
10580| [81348] Apache Open For Business Project (OFBiz) Content IDs / Map-Keys Unspecified XSS
10581| [81347] Apache Open For Business Project (OFBiz) Parameter Arrays Unspecified XSS
10582| [81346] Apache Open For Business Project (OFBiz) checkoutProcess.js getServerError() Function Unspecified XSS
10583| [81196] Apache Open For Business Project (OFBiz) FlexibleStringExpander Nested Script String Parsing Remote Code Execution
10584| [80981] Apache Hadoop Kerberos/MapReduce Security Feature User Impersonation Weakness
10585| [80571] Apache Traffic Server Host HTTP Header Parsing Remote Overflow
10586| [80547] Apache Struts XSLTResult.java File Upload Arbitrary Command Execution
10587| [80360] AskApache Password Protector Plugin for WordPress Error Page $_SERVER Superglobal XSS
10588| [80349] Apache HTTP Server mod_fcgid Module fcgid_spawn_ctl.c FcgidMaxProcessesPerClass Virtual Host Directive HTTP Request Parsing Remote DoS
10589| [80301] Apache Wicket /resources/ Absolute Path Arbitrary File Access
10590| [80300] Apache Wicket wicket:pageMapName Parameter XSS
10591| [79478] Apache Solr Extension for TYPO3 Unspecified XSS
10592| [79002] Apache MyFaces javax.faces.resource In Parameter Traversal Arbitrary File Access
10593| [78994] Apache Struts struts-examples/upload/upload-submit.do name Parameter XSS
10594| [78993] Apache Struts struts-cookbook/processDyna.do message Parameter XSS
10595| [78992] Apache Struts struts-cookbook/processSimple.do message Parameter XSS
10596| [78991] Apache Struts struts2-rest-showcase/orders clientName Parameter XSS
10597| [78990] Apache Struts struts2-showcase/person/editPerson.action Multiple Parameter XSS
10598| [78932] Apache APR Hash Collision Form Parameter Parsing Remote DoS
10599| [78903] Apache CXF SOAP Request Parsing WS-Security UsernameToken Policy Bypass
10600| [78600] Apache Tomcat HTTP DIGEST Authentication DigestAuthenticator.java Catalina Weakness Security Bypass
10601| [78599] Apache Tomcat HTTP DIGEST Authentication Realm Value Parsing Security Bypass
10602| [78598] Apache Tomcat HTTP DIGEST Authentication qop Value Parsing Security Bypass
10603| [78573] Apache Tomcat Parameter Saturation CPU Consumption Remote DoS
10604| [78556] Apache HTTP Server Status Code 400 Default Error Response httpOnly Cookie Disclosure
10605| [78555] Apache HTTP Server Threaded MPM %{cookiename}C Log Format String Cookie Handling Remote DoS
10606| [78501] Apache Struts ParameterInterceptor Class OGNL Expression Parsing Remote Command Execution
10607| [78331] Apache Tomcat Request Object Recycling Information Disclosure
10608| [78293] Apache HTTP Server Scoreboard Invalid Free Operation Local Security Bypass
10609| [78277] Apache Struts ExceptionDelegator Component Parameter Parsing Remote Code Execution
10610| [78276] Apache Struts DebuggingInterceptor Component Developer Mode Unspecified Remote Command Execution
10611| [78113] Apache Tomcat Hash Collision Form Parameter Parsing Remote DoS
10612| [78112] Apache Geronimo Hash Collision Form Parameter Parsing Remote DoS
10613| [78109] Apache Struts ParameterInterceptor Traversal Arbitrary File Overwrite
10614| [78108] Apache Struts CookieInterceptor Cookie Name Handling Remote Command Execution
10615| [77593] Apache Struts Conversion Error OGNL Expression Injection
10616| [77496] Apache ActiveMQ Failover Mechanism Openwire Request Parsing Remote DoS
10617| [77444] Apache HTTP Server mod_proxy Mdule Web Request HTTP/0.9 Protocol URL Parsing Proxy Remote Security Bypass
10618| [77374] Apache MyFaces Java Bean includeViewParameters Parsing EL Expression Security Weakness
10619| [77310] Apache HTTP Server mod_proxy Reverse Proxy Mode Security Bypass Weakness (2011-4317)
10620| [77234] Apache HTTP Server on cygwin Encoded Traversal Arbitrary File Access
10621| [77012] Apache HTTP Server server/utils.c ap_pregsub() Function htaccess File Handling Local Memory Consumption DoS
10622| [76944] Apache Tomcat Manager Application Servlets Access Restriction Bypass
10623| [76744] Apache HTTP Server server/utils.c ap_pregsub() Function htaccess File Handling Local Overflow
10624| [76189] Apache Tomcat HTTP DIGEST Authentication Weakness
10625| [76079] Apache HTTP Server mod_proxy Mdule Web Request URL Parsing Proxy Remote Security Bypass (2011-3368)
10626| [76072] Apache JServ jserv.conf jserv-status Handler jserv/ URI Request Parsing Local Information Disclosure
10627| [75807] Apache HTTP Server Incomplete Header Connection Saturation Remote DoS
10628| [75647] Apache HTTP Server mod_proxy_ajp Module mod_proxy_balancer HTTP Request Remote DoS
10629| [75376] Apache Libcloud SSL Certificate Validation MitM Server Spoofing Weakness
10630| [74853] Domain Technologie Control /etc/apache2/apache2.conf File Permissions Weakness dtcdaemons User Password Disclosure
10631| [74818] Apache Tomcat AJP Message Injection Authentication Bypass
10632| [74725] Apache Wicket Multi Window Support Unspecified XSS
10633| [74721] Apache HTTP Server ByteRange Filter Memory Exhaustion Remote DoS
10634| [74541] Apache Commons Daemon Jsvc Permissions Weakness Arbitrary File Access
10635| [74535] Apache Tomcat XML Parser Cross-application Multiple File Manipulation
10636| [74447] Apache Struts XWork Nonexistent Method s:submit Element Internal Java Class Remote Path Disclosure
10637| [74262] Apache HTTP Server Multi-Processing Module itk.c Configuration Merger mpm-itk root UID / GID Remote Privilege Escalation
10638| [74120] Apache HTTP Server mod_authnz_external mysql/mysql-auth.pl user Field SQL Injection
10639| [73920] Oracle Secure Backup /apache/htdocts/php/common.php username Parameter Remote Code Execution
10640| [73798] Apache Tomcat sendfile Request Start / Endpoint Parsing Local DoS
10641| [73797] Apache Tomcat sendfile Request Attribute Validation Weakness Local Access Restriction Bypass
10642| [73776] Apache Tomcat HTTP BIO Connector HTTP Pipelining Cross-user Remote Response Access
10643| [73644] Apache XML Security Signature Key Parsing Overflow DoS
10644| [73600] Apache Struts javatemplates Plugin Component Handlers .action URI Multiple Parameter XSS
10645| [73462] Apache Rampart/C util/rampart_timestamp_token.c rampart_timestamp_token_validate Function Expired Token Remote Access Restriction Bypass
10646| [73429] Apache Tomcat JMX MemoryUserDatabase Local Password Disclosure
10647| [73384] Apache HTTP Server mod_rewrite PCRE Resource Exhaustion DoS
10648| [73383] Apache HTTP Server Portable Runtime (APR) Library apr_fnmatch() Infinite Loop Remote DoS
10649| [73378] IBM WebSphere Application Server (WAS) JavaServer Pages org.apache.jasper.runtime.JspWriterImpl.response JSP Page Application Restart Remote DoS
10650| [73247] Apache Subversion mod_dav_svn File Permission Weakness Information Disclosure
10651| [73246] Apache Subversion mod_dav_svn Path-based Access Control Rule Handling Remote DoS
10652| [73245] Apache Subversion mod_dav_svn Baselined Resource Request Handling Remote DoS
10653| [73154] Apache Archiva Multiple Unspecified CSRF
10654| [73153] Apache Archiva /archiva/admin/deleteNetworkProxy!confirm.action proxyid Parameter XSS
10655| [72407] Apache Tomcat @ServletSecurity Initial Load Annotation Security Constraint Bypass Information Disclosure
10656| [72238] Apache Struts Action / Method Names <
10657| [71647] Apache HttpComponents HttpClient Proxy-Authorization Credentials Remote Disclosure
10658| [71558] Apache Tomcat SecurityManager ServletContext Attribute Traversal Arbitrary File Manipulation
10659| [71557] Apache Tomcat HTML Manager Multiple XSS
10660| [71075] Apache Archiva User Management Page XSS
10661| [71027] Apache Tomcat @ServletSecurity Annotation Security Constraint Bypass Information Disclosure
10662| [70925] Apache Continuum Project Pages Unspecified XSS (2011-0533)
10663| [70924] Apache Continuum Multiple Admin Function CSRF
10664| [70809] Apache Tomcat NIO HTTP Connector Request Line Processing DoS
10665| [70734] Apache CouchDB Request / Cookie Handling Unspecified XSS
10666| [70585] Oracle Fusion Middleware Oracle HTTP Server Apache Plugin Unspecified Remote Issue
10667| [70333] Apache Subversion rev_hunt.c blame Command Multiple Memory Leak Remote DoS
10668| [70332] Apache Subversion Apache HTTP Server mod_dav_svn repos.c walk FunctionSVNParentPath Collection Remote DoS
10669| [69659] Apache Archiva Admin Authentication Weakness Privilege Escalation
10670| [69520] Apache Archiva Administrator Credential Manipulation CSRF
10671| [69512] Apache Tomcat Set-Cookie Header HTTPOnly Flag Session Hijacking Weakness
10672| [69456] Apache Tomcat Manager manager/html/sessions Multiple Parameter XSS
10673| [69275] Apache mod_fcgid Module fcgid_bucket.c fcgid_header_bucket_read() Function Remote Overflow
10674| [69067] Apache Shiro URI Path Security Traversal Information Disclosure
10675| [68815] Apache MyFaces shared/util/StateUtils.java View State MAC Weakness Cryptographic Padding Remote View State Modification
10676| [68670] Apache Qpid C++ Broker Component broker/SessionAdapter.cpp SessionAdapter::ExchangeHandlerImpl::checkAlternate Function Exchange Alternate Remote DoS
10677| [68669] Apache Qpid cluster/Cluster.cpp Cluster::deliveredEvent Function Invalid AMQP Data Remote DoS
10678| [68662] Apache Axis2 dswsbobje.war Module Admin Account Default Password
10679| [68531] Apache Qpid qpidd sys/ssl/SslSocket.cpp Incomplete SSL Handshake Remote DoS
10680| [68327] Apache APR-util buckets/apr_brigade.c apr_brigade_split_line() Function Memory Consumption DoS
10681| [68314] Apache XML-RPC SAX Parser External Entity Information Disclosure
10682| [67964] Apache Traffic Server Transaction ID / Source Port Randomization Weakness DNS Cache Poisoning
10683| [67846] SUSE Lifecycle Management Server on SUSE Linux Enterprise apache2-slms Parameter Quoting CSRF
10684| [67294] Apache CXF XML SOAP Message Crafted Document Type Declaration Remote DoS
10685| [67240] Apache CouchDB Installation Page Direct Request Arbitrary JavaScript Code Execution CSRF
10686| [67205] Apache Derby BUILTIN Authentication Password Hash Generation Algorithm SHA-1 Transformation Password Substitution
10687| [66745] Apache HTTP Server Multiple Modules Pathless Request Remote DoS
10688| [66319] Apache Tomcat Crafted Transfer-Encoding Header Handling Buffer Recycling Remote DoS
10689| [66280] Apache Struts XWork ParameterInterceptor Server-Side Object Remote Code Execution
10690| [66226] Apache Axis2 Admin Interface Cookie Session Fixation
10691| [65697] Apache Axis2 / Java SOAP Message DTD Rejection Weakness Arbitrary File Access
10692| [65654] Apache HTTP Server mod_proxy_http mod_proxy_http.c Timeout Detection Weakness HTTP Request Response Disclosure
10693| [65429] Apache MyFaces Unencrypted ViewState Serialized View Object Manipulation Arbitrary Expression Language (EL) Statement Execution
10694| [65054] Apache ActiveMQ Jetty Error Handler XSS
10695| [64844] Apache Axis2/Java axis2/axis2-admin/engagingglobally modules Parameter XSS
10696| [64522] Apache Open For Business Project (OFBiz) ecommerce/control/contactus Multiple Parameter XSS
10697| [64521] Apache Open For Business Project (OFBiz) Web Tools Section entityName Parameter XSS
10698| [64520] Apache Open For Business Project (OFBiz) ecommerce/control/ViewBlogArticle contentId Parameter XSS
10699| [64519] Apache Open For Business Project (OFBiz) Control Servlet URI XSS
10700| [64518] Apache Open For Business Project (OFBiz) Show Portal Page Section start Parameter XSS
10701| [64517] Apache Open For Business Project (OFBiz) View Profile Section partyId Parameter XSS
10702| [64516] Apache Open For Business Project (OFBiz) Export Product Listing Section productStoreId Parameter XSS
10703| [64307] Apache Tomcat Web Application Manager/Host Manager CSRF
10704| [64056] mod_auth_shadow for Apache HTTP Server wait() Function Authentication Bypass
10705| [64023] Apache Tomcat WWW-Authenticate Header Local Host Information Disclosure
10706| [64020] Apache ActiveMQ Jetty ResourceHandler Crafted Request JSP File Source Disclosure
10707| [63895] Apache HTTP Server mod_headers Unspecified Issue
10708| [63368] Apache ActiveMQ createDestination.action JMSDestination Parameter CSRF
10709| [63367] Apache ActiveMQ createDestination.action JMSDestination Parameter XSS
10710| [63350] Apache CouchDB Hash Verification Algorithm Predictable Execution Time Weakness
10711| [63140] Apache Thrift Service Malformed Data Remote DoS
10712| [62676] Apache HTTP Server mod_proxy_ajp Module Crafted Request Remote DoS
10713| [62675] Apache HTTP Server Multi-Processing Module (MPM) Subrequest Header Handling Cross-thread Information Disclosure
10714| [62674] Apache HTTP Server mod_isapi Module Unloading Crafted Request Remote DoS
10715| [62231] Apache HTTP Server Logging Format Weakness Crafted DNS Response IP Address Spoofing
10716| [62230] Apache HTTP Server Crafted DNS Response Inverse Lookup Log Corruption XSS
10717| [62054] Apache Tomcat WAR Filename Traversal Work-directory File Deletion
10718| [62053] Apache Tomcat Autodeployment Process appBase File HTTP Request Authentication Bypass
10719| [62052] Apache Tomcat WAR File Traversal Arbitrary File Overwrite
10720| [62009] Apache HTTP Server src/modules/proxy/proxy_util.c mod_proxy ap_proxy_send_fb() Function Overflow
10721| [61379] Apache River Outrigger Entry Storage Saturation Memory Exhaustion DoS
10722| [61378] Apache Hadoop Map/Reduce JobTracker Memory Consumption DoS
10723| [61377] Apache Commons Modeler Multiple Mutable Static Fields Weakness
10724| [61376] Apache Rampart wsse:security Tag Signature Value Checking Weakness
10725| [60687] Apache C++ Standard Library (STDCXX) strxfrm() Function Overflow
10726| [60680] Apache Hadoop JobHistory Job Name Manipulation Weakness
10727| [60679] Apache ODE DeploymentWebService OMElement zipPart CRLF Injection
10728| [60678] Apache Roller Comment Email Notification Manipulation DoS
10729| [60677] Apache CouchDB Unspecified Document Handling Remote DoS
10730| [60428] Sun Java Plug-in org.apache.crimson.tree.XmlDocument Class reateXmlDocument Method Floppy Drive Access Bypass
10731| [60413] mod_throttle for Apache Shared Memory File Manipulation Local Privilege Escalation
10732| [60412] Sun Java Plug-in org.apache.xalan.processor.XSLProcessorVersion Class Unsigned Applet Variable Sharing Privilege Escalation
10733| [60396] Apache HTTP Server on OpenBSD Multipart MIME Boundary Remote Information Disclosure
10734| [60395] Apache HTTP Server on OpenBSD ETag HTTP Header Remote Information Disclosure
10735| [60232] PHP on Apache php.exe Direct Request Remote DoS
10736| [60176] Apache Tomcat Windows Installer Admin Default Password
10737| [60016] Apache HTTP Server on HP Secure OS for Linux HTTP Request Handling Unspecified Issue
10738| [59979] Apache HTTP Server on Apple Mac OS X HTTP TRACE Method Unspecified Client XSS
10739| [59969] Apache HTTP Server mod_ssl SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
10740| [59944] Apache Hadoop jobhistory.jsp XSS
10741| [59374] Apache Solr Search Extension for TYPO3 Unspecified XSS
10742| [59022] Apache Shindig ConcatProxyServlet HTTP Header Response Splitting
10743| [59021] Apache Cocoon X-Cocoon-Version Header Remote Information Disclosure
10744| [59020] Apache Tapestry HTTPS Session Cookie Secure Flag Weakness
10745| [59019] Apache mod_python Cookie Salting Weakness
10746| [59018] Apache Harmony Error Message Handling Overflow
10747| [59013] Apache Derby SYSCS_EXPORT_TABLE Arbitrary File Overwrite
10748| [59012] Apache Derby Driver Auto-loading Non-deterministic Startup Weakness
10749| [59011] Apache JSPWiki Page Attachment Change Note Function XSS
10750| [59010] Apache Solr get-file.jsp XSS
10751| [59009] Apache Solr action.jsp XSS
10752| [59008] Apache Solr analysis.jsp XSS
10753| [59007] Apache Solr schema.jsp Multiple Parameter XSS
10754| [59006] Apache Beehive select / checkbox Tag XSS
10755| [59005] Apache Beehive jpfScopeID Global Parameter XSS
10756| [59004] Apache Beehive Error Message XSS
10757| [59003] Apache HttpClient POST Request Handling Memory Consumption DoS
10758| [59002] Apache Jetspeed default-page.psml URI XSS
10759| [59001] Apache Axis2 xsd Parameter Traversal Arbitrary File Disclosure
10760| [59000] Apache CXF Unsigned Message Policy Bypass
10761| [58999] Apache WSS4J CallbackHandler Plaintext Password Validation Weakness
10762| [58998] Apache OpenJPA persistence.xml Cleartext Password Local Disclosure
10763| [58997] Apache OpenEJB openejb.xml Cleartext Password Local Disclosure
10764| [58996] Apache Hadoop Map/Reduce LinuxTaskController File Group Ownership Weakness
10765| [58995] Apache Hadoop Map/Reduce Task Ownership Weakness
10766| [58994] Apache Hadoop Map/Reduce DistributedCache Localized File Permission Weakness
10767| [58993] Apache Hadoop browseBlock.jsp XSS
10768| [58991] Apache Hadoop browseDirectory.jsp XSS
10769| [58990] Apache Hadoop Map/Reduce HTTP TaskTrackers User Data Remote Disclosure
10770| [58989] Apache Hadoop Sqoop Process Listing Local Cleartext Password Disclosure
10771| [58988] Apache Hadoop Chukwa HICC Portal Unspecified XSS
10772| [58987] Apache Hadoop Map/Reduce TaskTracker User File Permission Weakness
10773| [58986] Apache Qpid Encrypted Message Handling Remote Overflow DoS
10774| [58985] Apache Qpid Process Listing Local Cleartext Password Disclosure
10775| [58984] Apache Jackrabbit Content Repository (JCR) Default Account Privilege Access Weakness
10776| [58983] Apache Jackrabbit Content Repository (JCR) NamespaceRegistry API Registration Method Race Condition
10777| [58982] Apache Synapse Proxy Service Security Policy Mismatch Weakness
10778| [58981] Apache Geronimo TomcatGeronimoRealm Security Context Persistence Weakness
10779| [58980] Apache Geronimo LDAP Realm Configuration Restart Reversion Weakness
10780| [58979] Apache MyFaces Tomahawk ExtensionsPhaseListener HTML Injection Information Disclosure
10781| [58978] Apache MyFaces Trinidad LocaleInfoScriptlet XSS
10782| [58977] Apache Open For Business Project (OFBiz) Multiple Default Accounts
10783| [58976] Apache Open For Business Project (OFBiz) URI passThru Parameter XSS
10784| [58975] Apache Open For Business Project (OFBiz) PARTYMGR_CREATE/UPDATE Permission Arbitrary User Password Modification
10785| [58974] Apache Sling /apps Script User Session Management Access Weakness
10786| [58973] Apache Tuscany Crafted SOAP Request Access Restriction Bypass
10787| [58931] Apache Geronimo Cookie Parameters Validation Weakness
10788| [58930] Apache Xalan-C++ XPath Handling Remote DoS
10789| [58879] Apache Portable Runtime (APR-util) poll/unix/port.c Event Port Backend Pollset Feature Remote DoS
10790| [58837] Apache Commons Net FTPSClient CipherSuites / Protocols Mutable Object Unspecified Data Security Issue
10791| [58813] Apache MyFaces Trinidad tr:table / HTML Comment Handling DoS
10792| [58812] Apache Open For Business Project (OFBiz) JSESSIONID Session Hijacking Weakness
10793| [58811] Apache Open For Business Project (OFBiz) /catalog/control/EditProductConfigItem configItemId Parameter XSS
10794| [58810] Apache Open For Business Project (OFBiz) /catalog/control/EditProdCatalo prodCatalogId Parameter XSS
10795| [58809] Apache Open For Business Project (OFBiz) /partymgr/control/viewprofile partyId Parameter XSS
10796| [58808] Apache Open For Business Project (OFBiz) /catalog/control/createProduct internalName Parameter XSS
10797| [58807] Apache Open For Business Project (OFBiz) Multiple Unspecified CSRF
10798| [58806] Apache FtpServer MINA Logging Filter Cleartext Credential Local Disclosure
10799| [58805] Apache Derby Unauthenticated Database / Admin Access
10800| [58804] Apache Wicket Header Contribution Unspecified Issue
10801| [58803] Apache Wicket Session Fixation
10802| [58802] Apache Directory Server (ApacheDS) userPassword Attribute Search Password Disclosure
10803| [58801] Apache ActiveMQ Stomp Client Credential Validation Bypass
10804| [58800] Apache Tapestry (context)/servicestatus Internal Service Information Disclosure
10805| [58799] Apache Tapestry Logging Cleartext Password Disclosure
10806| [58798] Apache Jetspeed pipeline Parameter pipeline-map Policy Bypass
10807| [58797] Apache Jetspeed Password Policy Multiple Weaknesses
10808| [58796] Apache Jetspeed Unsalted Password Storage Weakness
10809| [58795] Apache Rampart Crafted SOAP Header Authentication Bypass
10810| [58794] Apache Roller Admin Protocol (RAP) Malformed Header Authentication Bypass
10811| [58793] Apache Hadoop Map/Reduce mapred.system.dir Permission Weakness Job Manipulation
10812| [58792] Apache Shindig gadgets.rpc iframe RPC Call Validation Weakness
10813| [58791] Apache Synapse synapse.properties Cleartext Credential Local Disclosure
10814| [58790] Apache WSS4J SOAP Message UsernameToken Remote Password Disclosure
10815| [58789] Apache WSS4J SOAP Header Malformed UsernameToken Authentication Bypass
10816| [58776] Apache JSPWiki PreviewContent.jsp Edited Text XSS
10817| [58775] Apache JSPWiki preview.jsp action Parameter XSS
10818| [58774] Apache JSPWiki Edit.jsp Multiple Parameter XSS
10819| [58773] Apache JSPWiki Accept-Language Header Multiple Script language Parameter XSS
10820| [58772] Apache JSPWiki EditorManager.java editor Parameter XSS
10821| [58771] Apache JSPWiki GroupContent.jsp Multiple Parameter XSS
10822| [58770] Apache JSPWiki Group.jsp group Parameter XSS
10823| [58769] Apache JSPWiki Database Connection Termination DoS Weakness
10824| [58768] Apache JSPWiki Attachment Servlet nextpage Parameter Arbitrary Site Redirect
10825| [58766] Apache JSPWiki /admin/SecurityConfig.jsp Direct Request Information Disclosure
10826| [58765] Apache JSPWiki Spam Filter UniqueID RNG Weakness
10827| [58764] Apache JSPWiki Edit.jsp Multiple Parameter XSS
10828| [58763] Apache JSPWiki Include Tag Multiple Script XSS
10829| [58762] Apache JSPWiki Multiple .java Tags pageContext Parameter XSS
10830| [58761] Apache JSPWiki Wiki.jsp skin Parameter XSS
10831| [58760] Apache Commons VFS Exception Error Message Cleartext Credential Disclosure
10832| [58759] Apache Jackrabbit Content Repository (JCR) UUID System.currentTimeMillis() RNG Weakness
10833| [58758] Apache River GrantPermission Policy Manipulation Privilege Escalation
10834| [58757] Apache WS-Commons Java2 StaXUtils Multiple Unspecified Minor Issues
10835| [58756] Apache WSS4J WSHandler Client Certificate Signature Validation Weakness
10836| [58755] Apache Harmony DRLVM Non-public Class Member Access
10837| [58754] Apache Harmony File.createTempFile() Temporary File Creation Prediction Weakness
10838| [58751] Apache Geronimo GeronimoIdentityResolver Subject Handling Multiple Issues
10839| [58750] Apache MyFaces Trinidad Generated HTML Information Disclosure
10840| [58749] Apache MyFaces Trinidad Database Access Error Message Information Disclosure
10841| [58748] Apache MyFaces Trinidad Image Resource Loader Traversal Arbitrary Image Access
10842| [58747] Apache MyFaces Trinidad Error Message User Entered Data Disclosure Weakness
10843| [58746] Apache Axis2 JAX-WS Java2 WSDL4J Unspecified Issue
10844| [58744] Apache Wicket Crafted File Upload Disk Space Exhaustion DoS
10845| [58743] Apache Wicket wicket.util.crypt.SunJceCrypt Encryption Reversion Weakness
10846| [58742] Apache Rampart PolicyBasedValiadtor HttpsToken Endpoint Connection Weakness
10847| [58741] Apache Rampart WSSecSignature / WSSecEncryptedKey KeyIdentifierType Validation Weakness
10848| [58740] Apache Rampart TransportBinding Message Payload Cleartext Disclosure
10849| [58739] Apache Open For Business Project (OFBiz) Unsalted Password Storage Weakness
10850| [58738] Apache Open For Business Project (OFBiz) orderId Parameter Arbitrary Order Access
10851| [58737] Apache mod_python w/ mod_python.publisher index.py Underscore Prefixed Variable Disclosure
10852| [58735] Apache Open For Business Project (OFBiz) /ecommerce/control/keywordsearch SEARCH_STRING Parameter XSS
10853| [58734] Apache Torque Log File Cleartext Credential Local Disclosure
10854| [58733] Apache Axis2 doGet Implementation Authentication Bypass Service State Manipulation
10855| [58732] Apache MyFaces UIInput.validate() Null Value Validation Bypass Weakness
10856| [58731] Apache MyFaces /faces/* Prefix Mapping Authentication Bypass
10857| [58725] Apache Tapestry Basic String ACL Bypass Weakness
10858| [58724] Apache Roller Logout Functionality Failure Session Persistence
10859| [58723] Apache Roller User Profile / Admin Page Cleartext Password Disclosure
10860| [58722] Apache Derby Connection URL Encryption Method Reversion Weakness
10861| [58721] Apache Geronimo on Tomcat Security-constraint Resource ACL Bypass
10862| [58720] Apache Geronimo Explicit Servlet Mapping Access Bypass Weakness
10863| [58719] Apache Geronimo Keystore Unprivileged Service Disable DoS
10864| [58718] Apache Geronimo Deployment Plans Remote Password Disclosure
10865| [58717] Apache Jetspeed Portlet Application Edit Access Restriction Bypass
10866| [58716] Apache Jetspeed PSML Management Cached Constraint Authentication Weakness
10867| [58707] Apache WSS4J Crafted PasswordDigest Request Authentication Bypass
10868| [58706] Apache HttpClient Pre-emptive Authorization Remote Credential Disclosure
10869| [58705] Apache Directory Server (ApacheDS) User Passwords Cleartext Disclosure
10870| [58704] Apache Directory Server (ApacheDS) Non-existent User LDAP Bind Remote DoS
10871| [58703] Apache Geronimo Debug Console Unauthenticated Remote Information Disclosure
10872| [58702] Apache Directory Server (ApacheDS) Persistent LDAP Anonymous Bind Weakness
10873| [58701] Apache Jetspeed User Admin Portlet Unpassworded Account Creation Weakness
10874| [58700] Apache MyFaces /faces/* Path Handling Remote Overflow DoS
10875| [58699] Apache MyFaces Disable Property Client Side Manipulation Privilege Escalation
10876| [58698] Apache Roller Remember Me Functionality Cleartext Password Disclosure
10877| [58697] Apache XalanJ2 org.apache.xalan.xsltc.runtime.CallFunction Class Unspecified Issue
10878| [58696] Apache Tapestry Encoded Traversal Arbitrary File Access
10879| [58695] Apache Jetspeed Unauthenticated PSML Tags / Admin Folder Access
10880| [58694] Apache Geronimo Deploy Tool Process List Local Credential Disclosure
10881| [58693] Apache Derby service.properties File Encryption Key Information Disclosure
10882| [58692] Apache Geronimo Default Security Realm Login Brute Force Weakness
10883| [58689] Apache Roller Retrieve Last 5 Post Feature Unauthorized Blog Post Manipulation
10884| [58688] Apache Xalan-Java (XalanJ2) Static Variables Multiple Unspecified Issues
10885| [58687] Apache Axis Invalid wsdl Request XSS
10886| [58686] Apache Cocoon Temporary File Creation Unspecified Race Condition
10887| [58685] Apache Velocity Template Designer Privileged Code Execution
10888| [58684] Apache Jetspeed controls.Customize Action Security Check Bypass
10889| [58675] Apache Open For Business Project (OFBiz) eCommerce/ordermgr Multiple Field XSS
10890| [58674] Apache Open For Business Project (OFBiz) ecommerce/control/login Multiple Field XSS
10891| [58673] Apache Open For Business Project (OFBiz) ecommerce/control/viewprofile Multiple Field XSS
10892| [58672] Apache Open For Business Project (OFBiz) POS Input Panel Cleartext Password Disclosure
10893| [58671] Apache Axis2 JMS Signed Message Crafted WS-Security Header Security Bypass
10894| [58670] Apache Jetspeed JetspeedTool.getPortletFromRegistry Portlet Security Validation Failure
10895| [58669] Apache Jetspeed LDAP Cleartext Passwords Disclosure
10896| [58668] Apache Axis External Entity (XXE) Data Parsing Privilege Escalation
10897| [58667] Apache Roller Database Cleartext Passwords Disclosure
10898| [58666] Apache Xerces-C++ UTF-8 Transcoder Overlong Code Handling Unspecified Issue
10899| [58665] Apache Jetspeed Turbine: Cross-user Privileged Action Execution
10900| [58664] Apache Jetspeed EditAccount.vm Password Modification Weakness
10901| [58663] Apache Jetspeed Role Parameter Arbitrary Portlet Disclosure
10902| [58662] Apache Axis JWS Page Generated .class File Direct Request Information Disclosure
10903| [58661] Apache Jetspeed user-form.vm Password Reset Cleartext Disclosure
10904| [58660] Apache WSS4J checkReceiverResults Function Crafted SOAP Request Authentication Bypass
10905| [58658] Apache Rampart Crafted SOAP Request Security Verification Bypass
10906| [57882] Apache HTTP Server mod_proxy_ftp Authorization HTTP Header Arbitrary FTP Command Injection
10907| [57851] Apache HTTP Server mod_proxy_ftp EPSV Command NULL Dereference Remote DoS
10908| [56984] Apache Xerces2 Java Malformed XML Input DoS
10909| [56903] Apache ODE (Orchestration Director Engine) Process Deployment Web Service Traversal Arbitrary File Manipulation
10910| [56859] Apache Xerces-C++ Multiple Sub-project XML Nested DTD Structures Parsing Recursion Error DoS
10911| [56766] Apache Portable Runtime (APR-util) memory/unix/apr_pools.c Relocatable Memory Block Aligning Overflow
10912| [56765] Apache Portable Runtime (APR-util) misc/apr_rmm.c Multiple Function Overflows
10913| [56517] Apache HTTP Server File Descriptor Leak Arbitrary Local File Append
10914| [56443] PTK Unspecified Apache Sub-process Arbitrary Command Execution
10915| [56414] Apache Tiles Duplicate Expression Language (EL) Expression Evaluation XSS
10916| [55814] mod_NTLM for Apache HTTP Server ap_log_rerror() Function Remote Format String
10917| [55813] mod_NTLM for Apache HTTP Server log() Function Remote Overflow
10918| [55782] Apache HTTP Server mod_deflate Module Aborted Connection DoS
10919| [55553] Apache HTTP Server mod_proxy Module mod_proxy_http.c stream_reqbody_cl Function CPU Consumption DoS
10920| [55059] Apache APR-util strmatch/apr_strmatch.c apr_strmatch_precompile Function Crafted Input Remote DoS
10921| [55058] Apache APR-util apr_brigade_vprintf Function Crafted Input Off-by-one Remote DoS
10922| [55057] Apache APR-util xml/apr_xml.c apr_xml_* Interface Expat XML Parser Crafted XML Document Remote DoS
10923| [55056] Apache Tomcat Cross-application TLD File Manipulation
10924| [55055] Apache Tomcat Illegal URL Encoded Password Request Username Enumeration
10925| [55054] Apache Tomcat Java AJP Connector mod_jk Load Balancing Worker Malformed Header Remote DoS
10926| [55053] Apache Tomcat Crafted Request Security Restraint Bypass Arbitrary Content Access
10927| [54733] Apache HTTP Server AllowOverride Directive .htaccess Options Bypass
10928| [54713] razorCMS Security Manager apache User Account Unspecified File Permission Weakness Issue
10929| [54589] Apache Jserv Nonexistent JSP Request XSS
10930| [54122] Apache Struts s:a / s:url Tag href Element XSS
10931| [54093] Apache ActiveMQ Web Console JMS Message XSS
10932| [53932] Apache Geronimo Multiple Admin Function CSRF
10933| [53931] Apache Geronimo /console/portal/Server/Monitoring Multiple Parameter XSS
10934| [53930] Apache Geronimo /console/portal/ URI XSS
10935| [53929] Apache Geronimo on Windows Security/Keystores Portlet Traversal Arbitrary File Upload
10936| [53928] Apache Geronimo on Windows Embedded DB/DB Manager Portlet Traversal Arbitrary File Upload
10937| [53927] Apache Geronimo on Windows Services/Repository Portlet Traversal Arbitrary File Upload
10938| [53921] Apache HTTP Server mod_proxy_ajp Cross Thread/Session Information Disclosure
10939| [53766] Oracle BEA WebLogic Server Plug-ins for Apache Certificate Handling Remote Overflow
10940| [53574] PHP on Apache .htaccess mbstring.func_overload Setting Cross Hosted Site Behavior Modification
10941| [53381] Apache Tomcat JK Connector Content-Length Header Cross-user Information Disclosure
10942| [53380] Apache Struts Unspecified XSS
10943| [53289] Apache mod_perl Apache::Status /perl-status Unspecified XSS
10944| [53186] Apache HTTP Server htpasswd Predictable Salt Weakness
10945| [52899] Apache Tomcat Examples Web Application Calendar Application jsp/cal/cal2.jsp time Parameter XSS
10946| [52407] Apache Tomcat doRead Method POST Content Information Disclosure
10947| [51923] Apache HTTP Server mod-auth-mysql Module mod_auth_mysql.c Multibyte Character Encoding SQL Injection
10948| [51613] Apache HTTP Server Third-party Module Child Process File Descriptor Leak
10949| [51612] Apache HTTP Server Internal Redirect Handling Infinite Loop DoS
10950| [51468] Apache Jackrabbit Content Repository (JCR) swr.jsp q Parameter XSS
10951| [51467] Apache Jackrabbit Content Repository (JCR) search.jsp q Parameter XSS
10952| [51151] Apache Roller Search Function q Parameter XSS
10953| [50482] PHP with Apache php_value Order Unspecified Issue
10954| [50475] Novell NetWare ApacheAdmin Console Unauthenticated Access
10955| [49734] Apache Struts DefaultStaticContentLoader Class Traversal Arbitrary File Access
10956| [49733] Apache Struts FilterDispatcher Class Traversal Arbitrary File Access
10957| [49283] Oracle BEA WebLogic Server Plugins for Apache Remote Transfer-Encoding Overflow
10958| [49062] Apache Tomcat Cross-thread Concurrent Request Variable Overwrite Information Disclosure
10959| [48847] ModSecurity (mod_security) Transformation Caching Unspecified Apache DoS
10960| [48788] Apache Xerces-C++ XML Schema maxOccurs Value XML File Handling DoS
10961| [47474] Apache HTTP Server mod_proxy_ftp Directory Component Wildcard Character XSS
10962| [47464] Apache Tomcat allowLinking / UTF-8 Traversal Arbitrary File Access
10963| [47463] Apache Tomcat RequestDispatcher Traversal Arbitrary File Access
10964| [47462] Apache Tomcat HttpServletResponse.sendError Method Message Argument XSS
10965| [47096] Oracle Weblogic Apache Connector POST Request Overflow
10966| [46382] Frontend Filemanager (air_filemanager) Extension for TYPO3 on Apache Unspecified Arbitrary Code Execution
10967| [46285] TYPO3 on Apache Crafted Filename Upload Arbitrary Command Execution
10968| [46085] Apache HTTP Server mod_proxy ap_proxy_http_process_response() Function Interim Response Forwarding Remote DoS
10969| [45905] Apache Tomcat Host Manager host-manager/html/add name Parameter XSS
10970| [45879] Ragnarok Online Control Panel on Apache Crafted Traversal Authentication Bypass
10971| [45742] Apache HTTP Server on Novell Unspecified Request Directive Internal IP Disclosure
10972| [45740] Apache Derby DropSchemaNode Bind Phase Arbitrary Scheme Statement Dropping
10973| [45599] Apache Derby Lock Table Statement Privilege Requirement Bypass Arbitrary Table Lock
10974| [45585] Apache Derby ACCSEC Command RDBNAM Parameter Cleartext Credential Disclosure
10975| [45584] Apache Derby DatabaseMetaData.getURL Function Cleartext Credential Disclosure
10976| [45420] Apache HTTP Server 403 Error Page UTF-7 Encoded XSS
10977| [44728] PHP Toolkit on Gentoo Linux Interpretation Conflict Apache HTTP Server Local DoS
10978| [44618] Oracle JSP Apache/Jserv Path Translation Traversal Arbitrary JSP File Execution
10979| [44159] Apache HTTP Server Remote Virtual Host Name Disclosure
10980| [43997] Apache-SSL ExpandCert() Function Certificate Handling Arbitrary Environment Variables Manipulation
10981| [43994] suPHP for Apache (mod_suphp) Directory Symlink Local Privilege Escalation
10982| [43993] suPHP for Apache (mod_suphp) Owner Mode Race Condition Symlink Local Privilege Escalation
10983| [43663] Apache HTTP Server Mixed Platform AddType Directive Crafted Request PHP Source Disclosure
10984| [43658] AuthCAS Module (AuthCAS.pm) for Apache HTTP Server SESSION_COOKIE_NAME SQL Injection
10985| [43452] Apache Tomcat HTTP Request Smuggling
10986| [43309] Apache Geronimo LoginModule Login Method Bypass
10987| [43290] Apache JSPWiki Entry Page Attachment Unrestricted File Upload
10988| [43259] Apache HTTP Server on Windows mod_proxy_balancer URL Handling Remote Memory Corruption
10989| [43224] Apache Geronimo on SuSE Linux init Script Symlink Unspecified File/Directory Access
10990| [43189] Apache mod_jk2 Host Header Multiple Fields Remote Overflow
10991| [42937] Apache HTTP Server mod_proxy_balancer balancer-manager Unspecified CSRF
10992| [42341] MOD_PLSQL for Apache Unspecified URL SQL Injection
10993| [42340] MOD_PLSQL for Apache CGI Environment Handling Unspecified Overflow
10994| [42214] Apache HTTP Server mod_proxy_ftp UTF-7 Encoded XSS
10995| [42091] Apache Maven Site Plugin Installation Permission Weakness
10996| [42089] Apache Maven .m2/settings.xml Cleartext Password Disclosure
10997| [42088] Apache Maven Defined Repo Process Listing Password Disclosure
10998| [42087] Apache Maven Site Plugin SSH Deployment Permission Setting Weakness
10999| [42036] Apache HTTP Server MS-DOS Device Request Host OS Disclosure
11000| [41891] BEA WebLogic Apache Beehive NetUI Page Flow Unspecified XSS
11001| [41436] Apache Tomcat Native APR Connector Duplicate Request Issue
11002| [41435] Apache Tomcat %5C Cookie Handling Session ID Disclosure
11003| [41434] Apache Tomcat Exception Handling Subsequent Request Information Disclosure
11004| [41400] LimeSurvey save.php Apache Log File PHP Code Injection
11005| [41029] Apache Tomcat Calendar Examples Application cal2.jsp Multiple Parameter CSRF
11006| [41019] Apache HTTP Server mod_negotiation Module Multi-Line Filename Upload XSS
11007| [41018] Apache HTTP Server mod_negotiation Module Multi-Line Filename Upload CRLF
11008| [40853] Apache Tomcat SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) JSESSIONIDSSO Cookie Security Weakness
11009| [40264] Apache HTTP Server mod_proxy_balancer balancer_handler Function bb Variable Remote DoS
11010| [40263] Apache HTTP Server mod_proxy_balancer balancer-manager Multiple Parameter XSS
11011| [40262] Apache HTTP Server mod_status refresh XSS
11012| [39833] Apache Tomcat JULI Logging Component catalina.policy Security Bypass
11013| [39251] Coppermine Photo Gallery on Apache Multiple File Extension Upload Arbitrary Code Execution
11014| [39166] Apache Tomcat on Windows caseSensitive Attribute Mixed Case Request JSP Source Disclosure
11015| [39134] Apache mod_imagemap Module Imagemap Unspecified XSS
11016| [39133] Apache mod_imap Module Imagemap File Unspecified XSS
11017| [39035] Apache Tomcat examples/servlet/CookieExample Multiple Parameter XSS
11018| [39003] Apache HTTP Server HTTP Method Header Request Entity Too Large XSS
11019| [39000] Apache Tomcat SendMailServlet sendmail.jsp mailfrom Parameter XSS
11020| [38939] Apache HTTP Server Prefork MPM Module Array Modification Local DoS
11021| [38673] Apache Jakarta Slide WebDAV SYSTEM Request Traversal Arbitrary File Access
11022| [38662] Apache Geronimo SQLLoginModule Nonexistent User Authentication Bypass
11023| [38661] Apache Geronimo MEJB Unspecified Authentication Bypass
11024| [38641] Apache HTTP Server mod_mem_cache recall_headers Function Information Disclosure
11025| [38640] Apache HTTP Server suexec Document Root Unauthorized Operations
11026| [38639] Apache HTTP Server suexec Multiple Symlink Privilege Escalation
11027| [38636] Apache HTTP Server mod_autoindex.c P Variable UTF-7 Charset XSS
11028| [38513] BEA WebLogic Server Proxy Plug-in for Apache Protocol Error Handling Remote DoS
11029| [38187] Apache Geronimo / Tomcat WebDAV XML SYSTEM Tag Arbitrary File Access
11030| [37079] Apache HTTP Server mod_cache cache_util.c Malformed Cache-Control Header DoS
11031| [37071] Apache Tomcat Cookie Handling Session ID Disclosure
11032| [37070] Apache Tomcat Cookie Handling Quote Delimiter Session ID Disclosure
11033| [37052] Apache HTTP Server mod_status mod_status.c Unspecified XSS
11034| [37051] Apache HTTP Server mod_proxy modules/proxy/proxy_util.c Crafted Header Remote DoS
11035| [37050] Apache HTTP Server Prefork MPM Module Crafted Code Sequence Local DoS
11036| [36417] Apache Tomcat Host Manager Servlet html/add Action aliases Parameter XSS
11037| [36377] Apache MyFaces Tomahawk JSF Application autoscroll Multiple Script XSS
11038| [36080] Apache Tomcat JSP Examples Crafted URI XSS
11039| [36079] Apache Tomcat Manager Uploaded Filename XSS
11040| [34888] Apache Tomcat Example Calendar Application cal2.jsp time Parameter XSS
11041| [34887] Apache Tomcat implicit-objects.jsp Crafted Header XSS
11042| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
11043| [34884] Apache Tomcat on Windows Nonexistent Resource Request Path Disclosure
11044| [34883] Apache Tomcat Crafted JSP File Request Path Disclosure
11045| [34882] Apache Tomcat Default SSL Ciphersuite Configuration Weakness
11046| [34881] Apache Tomcat Malformed Accept-Language Header XSS
11047| [34880] Apache Tomcat HTTP/1.1 Connector NULL Byte Request JSP Source Disclosure
11048| [34879] Apache Tomcat examples/jsp2/jspx/textRotate.jspx XSS
11049| [34878] Apache Tomcat examples/jsp2/el/implicit-objects.jsp XSS
11050| [34877] Apache Tomcat JK Web Server Connector (mod_jk) Double Encoded Traversal Arbitrary File Access
11051| [34876] Apache HTTP Server ScriptAlias CGI Source Disclosure
11052| [34875] Apache Tomcat appdev/sample/web/hello.jsp Multiple Parameter XSS
11053| [34874] Apache Tomcat AJP Connector mod_jk ajp_process_callback Remote Memory Disclosure
11054| [34873] Apache Stats Variable Extraction _REQUEST Ssuperglobal Array Overwrite
11055| [34872] Apache HTTP Server suexec User/Group Combination Weakness Local Privilege Escalation
11056| [34769] Apache Tomcat w/ Proxy Module Double Encoded Traversal Arbitrary File Access
11057| [34541] mod_perl for Apache HTTP Server RegistryCooker.pm PATH_INFO Crafted URI Remote DoS
11058| [34540] mod_perl for Apache HTTP Server PerlRun.pm PATH_INFO Crafted URI Remote DoS
11059| [34398] Apache Tomcat mod_jk Invalid Chunked Encoded Body Information Disclosure
11060| [34154] Apache Axis Nonexistent Java Web Service Path Disclosure
11061| [33855] Apache Tomcat JK Web Server Connector mod_jk.so Long URI Worker Map Remote Overflow
11062| [33816] Apache HTTP Server on Debian Linux TTY Local Privilege Escalation
11063| [33456] Apache HTTP Server Crafted TCP Connection Range Header DoS
11064| [33346] Avaya Multiple Products Apache Tomcat Port Weakness
11065| [32979] Apache Java Mail Enterprise Server (JAMES) Phoenix/MX4J Interface Arbitrary User Creation
11066| [32978] Apache Java Mail Enterprise Server (JAMES) POP3Server Log File Plaintext Password Disclosure
11067| [32724] Apache mod_python _filter_read Freed Memory Disclosure
11068| [32723] Apache Tomcat semicolon Crafted Filename Request Forced Directory Listing
11069| [32396] Apache Open For Business Project (OFBiz) Ecommerce Component Forum Implementation Message Body XSS
11070| [32395] Apache Open For Business Project (OFBiz) Ecommerce Component Form Field Manipulation Privilege Escalation
11071| [30354] Linux Subversion libapache2-svn Search Path Subversion Local Privilege Escalation
11072| [29603] PHP ini_restore() Apache httpd.conf Options Bypass
11073| [29536] Apache Tcl mod_tcl set_var Function Remote Format String
11074| [28919] Apache Roller Weblogger Blog Comment Multiple Field XSS
11075| [28130] PHP with Apache Mixed Case Method Limit Directive Bypass
11076| [27913] Apache HTTP Server on Windows mod_alias URL Validation Canonicalization CGI Source Disclosure
11077| [27588] Apache HTTP Server mod_rewrite LDAP Protocol URL Handling Overflow
11078| [27487] Apache HTTP Server Crafted Expect Header Cross Domain HTML Injection
11079| [26935] FCKeditor on Apache connector.php Crafted File Extension Arbitrary File Upload
11080| [26572] Apache Java Mail Enterprise Server (JAMES) MAIL Command Overflow DoS
11081| [25909] Drupal on Apache files Directory File Upload Arbitrary Code Execution
11082| [24825] Oracle ModPL/SQL for Apache Unspecified Remote HTTP Issue
11083| [24365] Apache Struts Multiple Function Error Message XSS
11084| [24364] Apache Struts getMultipartRequestHandler() Function Crafted Request DoS
11085| [24363] Apache Struts org.apache.struts.taglib.html.Constants.CANCEL Validation Bypass
11086| [24103] Pubcookie Apache mod_pubcookie Unspecified XSS
11087| [23906] Apache mod_python for Apache HTTP Server FileSession Privileged Local Command Execution
11088| [23905] Apache Log4net LocalSyslogAppender Format String Memory Corruption DoS
11089| [23198] Apache WSS4J Library SOAP Signature Verification Bypass
11090| [23124] Generic Apache Request Library (libapreq) apreq_parse_* Functions Remote DoS
11091| [22652] mod_php for Apache HTTP Server Crafted import_request_variables Function DoS
11092| [22475] PHP w/ Apache PDO::FETCH_CLASS __set() Function DoS
11093| [22473] PHP w/ Apache2 Crafted PDOStatement DoS
11094| [22459] Apache Geronimo Error Page XSS
11095| [22458] Apache Tomcat / Geronimo Sample Script cal2.jsp time Parameter XSS
11096| [22301] auth_ldap for Apache HTTP Server auth_ldap_log_reason() Function Remote Format String
11097| [22261] Apache HTTP Server mod_ssl ssl_hook_Access Error Handling DoS
11098| [22259] mod_auth_pgsql for Apache HTTP Server Log Function Format String
11099| [21736] Apache Java Mail Enterprise Server (JAMES) Spooler retrieve Function DoS
11100| [21705] Apache HTTP Server mod_imap Image Map Referer XSS
11101| [21021] Apache Struts Error Message XSS
11102| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
11103| [20491] PHP mod_php apache2handler SAPI Crafted .htaccess DoS
11104| [20462] Apache HTTP Server worker.c MPM Memory Exhaustion DoS
11105| [20439] Apache Tomcat Directory Listing Saturation DoS
11106| [20373] Apache Tomcat on HP Secure OS for Linux Unspecified Servlet Access Issue
11107| [20285] Apache HTTP Server Log File Control Character Injection
11108| [20242] Apache HTTP Server mod_usertrack Predictable Session ID Generation
11109| [20209] Brainf*ck Module (mod_bf) for Apache HTTP Server Local Overflow
11110| [20033] Apache Tomcat MS-DOS Device Request Error Message Path Disclosure
11111| [19883] apachetop atop.debug Symlink Arbitrary File Overwrite
11112| [19863] mod_auth_shadow for Apache HTTP Server require group Authentication Bypass
11113| [19855] Apache HTTP Server ErrorDocument Directive .htaccess Bypass
11114| [19821] Apache Tomcat Malformed Post Request Information Disclosure
11115| [19769] Apache HTTP Server Double-reverse DNS Lookup Spoofing
11116| [19188] Apache HTTP Server mod_ssl SSLVerifyClient Per-location Context Restriction Bypass
11117| [19137] Apache HTTP Server on Red Hat Linux Double Slash GET Request Forced Directory Listing
11118| [19136] Apache on Mandrake Linux Arbitrary Directory Forced Listing
11119| [18977] Apache HTTP Server Crafted HTTP Range Header DoS
11120| [18389] Ragnarok Online Control Panel Apache Authentication Bypass
11121| [18286] Apache HTTP Server mod_ssl ssl_callback_SSLVerify_CRL( ) Function Overflow
11122| [18233] Apache HTTP Server htdigest user Variable Overfow
11123| [17738] Apache HTTP Server HTTP Request Smuggling
11124| [16586] Apache HTTP Server Win32 GET Overflow DoS
11125| [15889] Apache HTTP Server mod_cgid Threaded MPM CGI Output Misdirection
11126| [14896] mod_dav for Apache HTTP Server Remote Null Dereference Child Process Termination
11127| [14879] Apache HTTP Server ap_log_rerror Function Error Message Path Disclosure
11128| [14770] Apache Tomcat AJP12 Protocol Malformed Packet Remote DoS
11129| [14597] Apache Tomcat IntegerOverflow.jsp Test JSP Script Path Disclosure
11130| [14596] Apache Tomcat pageSession.jsp Test JSP Script Path Disclosure
11131| [14595] Apache Tomcat pageLanguage.jsp Test JSP Script Path Disclosure
11132| [14594] Apache Tomcat pageIsThreadSafe.jsp Test JSP Script Path Disclosure
11133| [14593] Apache Tomcat pageIsErrorPage.jsp Test JSP Script Path Disclosure
11134| [14592] Apache Tomcat pageInvalid.jsp Test JSP Script Path Disclosure
11135| [14591] Apache Tomcat pageExtends.jsp Test JSP Script Path Disclosure
11136| [14590] Apache Tomcat pageDouble.jsp Test JSP Script Path Disclosure
11137| [14589] Apache Tomcat pageAutoFlush.jsp Test JSP Script Path Disclosure
11138| [14588] Apache Tomcat extends2.jsp Test JSP Script Path Disclosure
11139| [14587] Apache Tomcat extends1.jsp Test JSP Script Path Disclosure
11140| [14586] Apache Tomcat comments.jsp Test JSP Script Path Disclosure
11141| [14585] Apache Tomcat buffer4.jsp Test JSP Script Path Disclosure
11142| [14584] Apache Tomcat buffer3.jsp Test JSP Script Path Disclosure
11143| [14583] Apache Tomcat buffer2.jsp Test JSP Script Path Disclosure
11144| [14582] Apache Tomcat buffer1.jsp Test JSP Script Path Disclosure
11145| [14581] Apache Tomcat pageImport2.jsp Test JSP Script Path Disclosure
11146| [14580] Apache Tomcat pageInfo.jsp Test JSP Script Path Disclosure
11147| [14410] mod_frontpage for Apache HTTP Server fpexec Remote Overflow
11148| [14044] Apache Batik Squiggle Browser with Rhino Scripting Engine Unspecified File System Access
11149| [13737] mod_access_referer for Apache HTTP Server Malformed Referer DoS
11150| [13711] Apache mod_python publisher.py Traversal Arbitrary Object Information Disclosure
11151| [13640] mod_auth_any for Apache HTTP Server on Red Hat Linux Metacharacter Command Execution
11152| [13304] Apache Tomcat realPath.jsp Path Disclosure
11153| [13303] Apache Tomcat source.jsp Arbitrary Directory Listing
11154| [13087] Apache HTTP Server mod_log_forensic check_forensic Symlink Arbitrary File Creation / Overwrite
11155| [12849] mod_auth_radius for Apache HTTP Server radcpy() Function Overflow DoS
11156| [12848] Apache HTTP Server htdigest realm Variable Overflow
11157| [12721] Apache Tomcat examples/jsp2/el/functions.jsp XSS
11158| [12720] mod_dosevasive for Apache HTTP Server Symlink Arbitrary File Create/Overwrite
11159| [12558] Apache HTTP Server IPv6 FTP Proxy Socket Failure DoS
11160| [12557] Apache HTTP Server prefork MPM accept Error DoS
11161| [12233] Apache Tomcat MS-DOS Device Name Request DoS
11162| [12232] Apache Tomcat with JDK Arbitrary Directory/Source Disclosure
11163| [12231] Apache Tomcat web.xml Arbitrary File Access
11164| [12193] Apache HTTP Server on Mac OS X File Handler Bypass
11165| [12192] Apache HTTP Server on Mac OS X Unauthorized .ht and .DS_Store File Access
11166| [12178] Apache Jakarta Lucene results.jsp XSS
11167| [12176] mod_digest_apple for Apache HTTP Server on Mac OS X Authentication Replay
11168| [11391] Apache HTTP Server Header Parsing Space Saturation DoS
11169| [11003] Apache HTTP Server mod_include get_tag() Function Local Overflow
11170| [10976] mod_mylo for Apache HTTP Server mylo_log Logging Function HTTP GET Overflow
11171| [10637] Apache HTTP Server mod_ssl SSLCipherSuite Access Restriction Bypass
11172| [10546] Macromedia JRun4 mod_jrun Apache Module Remote Overflow
11173| [10471] Apache Xerces-C++ XML Parser DoS
11174| [10218] Apache HTTP Server Satisfy Directive Access Control Bypass
11175| [10068] Apache HTTP Server htpasswd Local Overflow
11176| [10049] mod_cplusplus For Apache HTTP Server Unspecified Overflow
11177| [9994] Apache HTTP Server apr-util IPV6 Parsing DoS
11178| [9991] Apache HTTP Server ap_resolve_env Environment Variable Local Overflow
11179| [9948] mod_dav for Apache HTTP Server LOCK Request DoS
11180| [9742] Apache HTTP Server mod_ssl char_buffer_read Function Reverse Proxy DoS
11181| [9718] Apache HTTP Server Win32 Single Dot Append Arbitrary File Access
11182| [9717] Apache HTTP Server mod_cookies Cookie Overflow
11183| [9716] Apache::Gallery Gallery.pm Inline::C Predictable Filename Code Execution
11184| [9715] Apache HTTP Server rotatelogs Control Characters Over Pipe DoS
11185| [9714] Apache Authentication Module Threaded MPM DoS
11186| [9713] Apache HTTP Server on OS2 filestat.c Device Name Request DoS
11187| [9712] Apache HTTP Server Multiple Linefeed Request Memory Consumption DoS
11188| [9711] Apache HTTP Server Access Log Terminal Escape Sequence Injection
11189| [9710] Apache HTTP Server on Windows Illegal Character Default Script Mapping Bypass
11190| [9709] Apache HTTP Server on Windows MS-DOS Device Name HTTP Post Code Execution
11191| [9708] Apache HTTP Server on Windows MS-DOS Device Name DoS
11192| [9707] Apache HTTP Server Duplicate MIME Header Saturation DoS
11193| [9706] Apache Web Server Multiple MIME Header Saturation Remote DoS
11194| [9705] Apache Tomcat Invoker/Default Servlet Source Disclosure
11195| [9702] Apache HTTP Server CGI/WebDAV HTTP POST Request Source Disclosure
11196| [9701] Apache HTTP Server for Windows Multiple Slash Forced Directory Listing
11197| [9700] Apache HTTP Server mod_autoindex Multiple Slash Request Forced Directory Listing
11198| [9699] Apache HTTP Server mod_dir Multiple Slash Request Forced Directory Listing
11199| [9698] Apache HTTP Server mod_negotiation Multiple Slash Request Forced Directory Listing
11200| [9697] Apache HTTP Server htdigest Local Symlink Arbitrary File Overwrite
11201| [9696] Apache HTTP Server htpasswd Local Symlink Arbitrary File Overwrite
11202| [9695] Apache Tomcat SnoopServlet Servlet Information Disclosure
11203| [9694] PHP3 on Apache HTTP Server Encoded Traversal Arbitrary File Access
11204| [9693] mod_auth_pgsql_sys for Apache HTTP Server User Name SQL Injection
11205| [9692] Apache HTTP Server mod_vhost_alias Mass Virtual Hosting Arbitrary File Access
11206| [9691] Apache HTTP Server mod_rewrite Mass Virtual Hosting Arbitrary File Access
11207| [9690] Apache HTTP Server mod_vhost_alias CGI Program Source Disclosure
11208| [9689] Trustix httpsd for Apache-SSL Permission Weakness Privilege Escalation
11209| [9688] Apache HTTP Server mod_proxy Malformed FTP Command DoS
11210| [9687] Apache::AuthenSmb smbval SMB Authentication Library Multiple Overflows
11211| [9686] Apache::AuthenSmb smbvalid SMB Authentication Library Multiple Overflows
11212| [9523] Apache HTTP Server mod_ssl Aborted Connection DoS
11213| [9459] Oracle PL/SQL (mod_plsql) Apache Module Help Page Request Remote Overflow
11214| [9208] Apache Tomcat .jsp Encoded Newline XSS
11215| [9204] Apache Tomcat ROOT Application XSS
11216| [9203] Apache Tomcat examples Application XSS
11217| [9068] Apache HTTP Server mod_userdir User Account Information Disclosure
11218| [8773] Apache Tomcat Catalina org.apache.catalina.servlets.DefaultServlet Source Code Disclosure
11219| [8772] Apache Tomcat Catalina org.apache.catalina.connector.http DoS
11220| [7943] Apache HTTP Server mod_ssl sslkeys File Disclosure
11221| [7942] Apache HTTP Server mod_ssl Default Pass Phrase
11222| [7941] Apache HTTP Server mod_ssl Encrypted Private Key File Descriptor Leak
11223| [7935] Apache HTTP Server mod_ssl ssl_gcache Race Conditions
11224| [7934] Apache HTTP Server mod_ssl SSLSessionCache File Content Disclosure
11225| [7933] Apache HTTP Server mod_ssl SSLMutex File Content Disclosure
11226| [7932] Apache HTTP Server mod_ssl mkcert.sh File Creation Permission Weakness
11227| [7931] Apache HTTP Server mod_ssl X.509 Client Certificate Authentication Bypass
11228| [7930] Apache HTTP Server mod_ssl ssl_expr_eval_func_file() Overflow
11229| [7929] Apache HTTP Server mod_ssl ssl_engine_log.c mod_proxy Hook Function Remote Format String
11230| [7611] Apache HTTP Server mod_alias Local Overflow
11231| [7394] Apache Tomcat mod_jk Invalid Transfer-Encoding Chunked Field DoS
11232| [7203] Apache Tomcat source.jsp Traversal Arbitrary File Access
11233| [7039] Apache HTTP Server on Mac OS X HFS+ File System Access Bypass
11234| [6882] Apache mod_python Malformed Query String Variant DoS
11235| [6839] Apache HTTP Server mod_proxy Content-Length Overflow
11236| [6630] Apache Tomcat Java Server Pages (JSP) Engine WPrinterJob() DoS
11237| [6472] Apache HTTP Server mod_ssl ssl_util_uuencode_binary Remote Overflow
11238| [5821] Apache HTTP Server Multiple / GET Remote Overflow DoS
11239| [5580] Apache Tomcat Servlet Malformed URL JSP Source Disclosure
11240| [5552] Apache HTTP Server split-logfile Arbitrary .log File Overwrite
11241| [5526] Apache Tomcat Long .JSP URI Path Disclosure
11242| [5278] Apache Tomcat web.xml Restriction Bypass
11243| [5051] Apache Tomcat Null Character DoS
11244| [4973] Apache Tomcat servlet Mapping XSS
11245| [4650] mod_gzip for Apache HTTP Server Debug Mode Printf Stack Overflow
11246| [4649] mod_gzip for Apache HTTP Server Debug Mode Format String Overflow
11247| [4648] mod_gzip for Apache HTTP Server Debug Mode Race Condition
11248| [4568] mod_survey For Apache ENV Tags SQL Injection
11249| [4553] Apache HTTP Server ApacheBench Overflow DoS
11250| [4552] Apache HTTP Server Shared Memory Scoreboard DoS
11251| [4446] Apache HTTP Server mod_disk_cache Stores Credentials
11252| [4383] Apache HTTP Server Socket Race Condition DoS
11253| [4382] Apache HTTP Server Log Entry Terminal Escape Sequence Injection
11254| [4340] Apache Portable Runtime (APR) apr_psprintf DoS
11255| [4232] Apache Cocoon DatabaseAuthenticatorAction SQL Injection
11256| [4231] Apache Cocoon Error Page Server Path Disclosure
11257| [4182] Apache HTTP Server mod_ssl Plain HTTP Request DoS
11258| [4181] Apache HTTP Server mod_access IP Address Netmask Rule Bypass
11259| [4075] Apache HTTP Sever on Windows .var File Request Path Disclosure
11260| [4037] Apache HTTP Server on Cygwin Encoded GET Request Arbitrary File Access
11261| [3877] Apache-SSL SSLVerifyClient SSLFakeBasicAuth Client Certificate Forgery
11262| [3819] Apache HTTP Server mod_digest Cross Realm Credential Replay
11263| [3322] mod_php for Apache HTTP Server Process Hijack
11264| [3215] mod_php for Apache HTTP Server File Descriptor Leakage
11265| [2885] Apache mod_python Malformed Query String DoS
11266| [2749] Apache Cocoon view-source Sample File Traversal Arbitrary File Access
11267| [2733] Apache HTTP Server mod_rewrite Local Overflow
11268| [2672] Apache HTTP Server mod_ssl SSLCipherSuite Ciphersuite Downgrade Weakness
11269| [2613] Apache HTTP Server mod_cgi stderr Output Handling Local DoS
11270| [2149] Apache::Gallery Privilege Escalation
11271| [2107] Apache HTTP Server mod_ssl Host: Header XSS
11272| [1926] Apache HTTP Server mod_rewrite Crafted URI Rule Bypass
11273| [1833] Apache HTTP Server Multiple Slash GET Request DoS
11274| [1577] Apache HTTP Server mod_rewrite RewriteRule Expansion Arbitrary File Access
11275| [872] Apache Tomcat Multiple Default Accounts
11276| [862] Apache HTTP Server SSI Error Page XSS
11277| [859] Apache HTTP Server Win32 Crafted Traversal Arbitrary File Access
11278| [849] Apache Tomcat TroubleShooter Servlet Information Disclosure
11279| [845] Apache Tomcat MSDOS Device XSS
11280| [844] Apache Tomcat Java Servlet Error Page XSS
11281| [842] Apache HTTP Server mod_ssl ssl_compat_directive Function Overflow
11282| [838] Apache HTTP Server Chunked Encoding Remote Overflow
11283| [827] PHP4 for Apache on Windows php.exe Malformed Request Path Disclosure
11284| [775] Apache mod_python Module Importing Privilege Function Execution
11285| [769] Apache HTTP Server Win32 DOS Batch File Arbitrary Command Execution
11286| [756] Apache HTTP Server mod_ssl i2d_SSL_SESSION Function SSL Client Certificate Overflow
11287| [701] Apache HTTP Server Win32 ScriptAlias php.exe Arbitrary File Access
11288| [674] Apache Tomcat Nonexistent File Error Message Path Disclosure
11289| [637] Apache HTTP Server UserDir Directive Username Enumeration
11290| [623] mod_auth_pgsql for Apache HTTP Server User Name SQL Injection
11291| [582] Apache HTTP Server Multiviews Feature Arbitrary Directory Listing
11292| [562] Apache HTTP Server mod_info /server-info Information Disclosure
11293| [561] Apache Web Servers mod_status /server-status Information Disclosure
11294| [417] Apache HTTP Server on SuSE Linux /doc/packages Remote Information Disclosure
11295| [410] mod_perl for Apache HTTP Server /perl/ Directory Listing
11296| [404] Apache HTTP Server on SuSE Linux WebDAV PROPFIND Arbitrary Directory Listing
11297| [402] Apache HTTP Server on SuSE Linux cgi-bin-sdb Request Script Source Disclosure
11298| [379] Apache ASP module Apache::ASP source.asp Example File Arbitrary File Creation
11299| [377] Apache Tomcat Snoop Servlet Remote Information Disclosure
11300| [376] Apache Tomcat contextAdmin Arbitrary File Access
11301| [342] Apache HTTP Server for Windows Multiple Forward Slash Directory Listing
11302| [222] Apache HTTP Server test-cgi Arbitrary File Access
11303| [143] Apache HTTP Server printenv.pl Multiple Method CGI XSS
11304| [48] Apache HTTP Server on Debian /usr/doc Directory Information Disclosure
11305|_
11306139/tcp closed netbios-ssn
11307443/tcp closed https
11308445/tcp closed microsoft-ds
11309###################################################################################################################################
11310Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:27 EST
11311Nmap scan report for 199.191.50.92
11312Host is up (0.46s latency).
11313Not shown: 470 filtered ports, 4 closed ports
11314Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
11315PORT STATE SERVICE VERSION
1131653/tcp open tcpwrapped
1131780/tcp open http Apache httpd
11318| http-robots.txt: 1 disallowed entry
11319|_/contact_us.php
11320|_http-server-header: Apache
11321|_http-title: Did not follow redirect to http://unifwd.com
11322Device type: general purpose|load balancer
11323Running (JUST GUESSING): Linux 2.6.X (90%), Citrix embedded (85%)
11324OS CPE: cpe:/o:linux:linux_kernel:2.6
11325Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (90%), Citrix NetScaler load balancer (85%)
11326No exact OS matches for host (test conditions non-ideal).
11327Network Distance: 19 hops
11328
11329TRACEROUTE (using port 80/tcp)
11330HOP RTT ADDRESS
113311 426.81 ms 10.246.204.1
113322 426.90 ms 160.116.0.161
113333 426.89 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
113344 426.88 ms bzq-219-189-185.dsl.bezeqint.net (62.219.189.185)
113355 426.90 ms bzq-219-189-2.cablep.bezeqint.net (62.219.189.2)
113366 426.96 ms bzq-219-189-57.cablep.bezeqint.net (62.219.189.57)
113377 427.00 ms ge-2-1-0.mpr1.lhr2.uk.above.net (195.66.224.76)
113388 427.00 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
113399 427.02 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
1134010 ...
1134111 632.29 ms ae0.cs2.lga5.us.eth.zayo.com (64.125.29.187)
1134212 632.35 ms ae0.cs2.lga5.us.eth.zayo.com (64.125.29.187)
1134313 632.40 ms ae4.cs2.dca2.us.eth.zayo.com (64.125.29.31)
1134414 632.36 ms ae2.mpr2.aus1.us.zip.zayo.com (64.125.31.250)
1134515 632.45 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
1134616 632.40 ms 209.66.92.122.IPYX-085258-900-ZYO.above.net (209.66.92.122)
1134717 632.36 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1134818 632.40 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1134919 632.26 ms 199.191.50.92
11350##################################################################################################################################
11351Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:29 EST
11352Nmap scan report for 199.191.50.92
11353Host is up (0.38s latency).
11354Not shown: 14 filtered ports, 1 closed port
11355Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
11356PORT STATE SERVICE VERSION
1135753/tcp open tcpwrapped
1135853/udp open mdns DNS-based service discovery
11359| dns-nsid:
11360| NSID: d9-dns-1.srv.media.net (64392d646e732d312e7372762e6d656469612e6e6574)
11361|_ id.server: d9-dns-1.srv.media.net
1136267/udp open|filtered dhcps
1136368/udp open|filtered dhcpc
1136469/udp open|filtered tftp
1136588/udp open|filtered kerberos-sec
11366123/udp open|filtered ntp
11367139/udp open|filtered netbios-ssn
11368161/udp open|filtered snmp
11369162/udp open|filtered snmptrap
11370389/udp open|filtered ldap
11371520/udp open|filtered route
113722049/udp open|filtered nfs
11373Aggressive OS guesses: Linux 4.10 (91%), HP P2000 G3 NAS device (90%), Linux 3.18 (89%), Linux 3.16 - 4.6 (89%), Linux 4.4 (89%), Linux 3.10 - 4.11 (87%), Linux 3.13 (87%), Linux 3.13 or 4.2 (87%), Linux 4.1 (87%), Linux 4.2 (87%)
11374No exact OS matches for host (test conditions non-ideal).
11375Network Distance: 21 hops
11376
11377TRACEROUTE (using port 53/tcp)
11378HOP RTT ADDRESS
113791 458.54 ms 10.246.204.1
113802 458.63 ms 160.116.0.161
113813 458.60 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
113824 458.66 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
113835 458.63 ms bzq-219-189-2.dsl.bezeqint.net (62.219.189.2)
113846 458.73 ms bzq-179-72-242.cust.bezeqint.net (212.179.72.242)
113857 458.80 ms ge-2-1-0.mpr1.lhr2.uk.above.net (195.66.224.76)
113868 458.77 ms bzq-179-72-242.cust.bezeqint.net (212.179.72.242)
113879 458.79 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
1138810 618.57 ms ae5.cs3.lga5.us.eth.zayo.com (64.125.29.126)
1138911 ...
1139012 634.61 ms ae4.cs2.dca2.us.eth.zayo.com (64.125.29.31)
1139113 634.59 ms ae3.cs2.iah1.us.eth.zayo.com (64.125.29.45)
1139214 634.59 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
1139315 634.63 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
1139416 634.60 ms 209.66.92.122.IPYX-085258-900-ZYO.above.net (209.66.92.122)
1139517 634.51 ms po10.gw2.pod1.tx1.datafoundry.net (209.99.14.106)
1139618 634.57 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1139719 634.54 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1139820 632.51 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1139921 647.68 ms 199.191.50.92
11400##################################################################################################################################
11401Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:34 EST
11402Nmap scan report for 199.191.50.92
11403Host is up (0.086s latency).
11404
11405PORT STATE SERVICE VERSION
1140653/tcp filtered domain
11407Too many fingerprints match this host to give specific OS details
11408Network Distance: 19 hops
11409
11410Host script results:
11411|_dns-brute: Can't guess domain of "199.191.50.92"; use dns-brute.domain script argument.
11412
11413TRACEROUTE (using proto 1/icmp)
11414HOP RTT ADDRESS
114151 424.33 ms 10.246.204.1
114162 424.43 ms 160.116.0.161
114173 424.39 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
114184 424.42 ms bzq-219-189-185.dsl.bezeqint.net (62.219.189.185)
114195 424.46 ms bzq-219-189-2.cablep.bezeqint.net (62.219.189.2)
114206 424.55 ms bzq-179-124-78.cust.bezeqint.net (212.179.124.78)
114217 424.60 ms ge-2-1-0.mpr1.lhr2.uk.above.net (195.66.224.76)
114228 424.58 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
114239 585.07 ms ae27.cs1.lhr11.uk.eth.zayo.com (64.125.30.236)
1142410 378.54 ms ae5.cs3.lga5.us.eth.zayo.com (64.125.29.126)
1142511 638.22 ms ae0.cs2.lga5.us.eth.zayo.com (64.125.29.187)
1142612 638.23 ms ae4.cs2.dca2.us.eth.zayo.com (64.125.29.31)
1142713 638.20 ms ae3.cs2.iah1.us.eth.zayo.com (64.125.29.45)
1142814 638.26 ms ae2.mpr2.aus1.us.zip.zayo.com (64.125.31.250)
1142915 638.27 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
1143016 638.20 ms 209.66.92.122.IPYX-085258-900-ZYO.above.net (209.66.92.122)
1143117 638.21 ms po10.gw2.pod1.tx1.datafoundry.net (209.99.14.106)
1143218 638.25 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1143319 635.58 ms 199.191.50.92
11434##################################################################################################################################
11435Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:35 EST
11436Nmap scan report for 199.191.50.92
11437Host is up (0.11s latency).
11438
11439PORT STATE SERVICE VERSION
1144067/tcp filtered dhcps
1144167/udp open|filtered dhcps
11442|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
11443Too many fingerprints match this host to give specific OS details
11444Network Distance: 19 hops
11445
11446TRACEROUTE (using proto 1/icmp)
11447HOP RTT ADDRESS
114481 314.91 ms 10.246.204.1
114492 315.02 ms 160.116.0.161
114503 314.97 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
114514 315.00 ms bzq-219-189-185.cablep.bezeqint.net (62.219.189.185)
114525 315.03 ms bzq-219-189-2.cablep.bezeqint.net (62.219.189.2)
114536 410.04 ms bzq-179-124-78.cust.bezeqint.net (212.179.124.78)
114547 410.09 ms ge-2-1-0.mpr1.lhr2.uk.above.net (195.66.224.76)
114558 315.20 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
114569 ...
1145710 568.63 ms ae5.cs3.lga5.us.eth.zayo.com (64.125.29.126)
1145811 442.83 ms ae0.cs2.lga5.us.eth.zayo.com (64.125.29.187)
1145912 442.79 ms ae4.cs2.dca2.us.eth.zayo.com (64.125.29.31)
1146013 442.69 ms ae3.cs2.iah1.us.eth.zayo.com (64.125.29.45)
1146114 442.81 ms ae2.mpr2.aus1.us.zip.zayo.com (64.125.31.250)
1146215 442.81 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
1146316 442.77 ms 209.66.92.122.IPYX-085258-900-ZYO.above.net (209.66.92.122)
1146417 630.77 ms po10.gw2.pod1.tx1.datafoundry.net (209.99.14.106)
1146518 630.78 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1146619 626.85 ms 199.191.50.92
11467##################################################################################################################################
11468Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:37 EST
11469Nmap scan report for 199.191.50.92
11470Host is up (0.19s latency).
11471
11472PORT STATE SERVICE VERSION
1147368/tcp filtered dhcpc
1147468/udp open|filtered dhcpc
11475Too many fingerprints match this host to give specific OS details
11476Network Distance: 19 hops
11477
11478TRACEROUTE (using proto 1/icmp)
11479HOP RTT ADDRESS
114801 377.12 ms 10.246.204.1
114812 377.20 ms 160.116.0.161
114823 377.22 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
114834 377.19 ms bzq-219-189-185.cablep.bezeqint.net (62.219.189.185)
114845 377.21 ms bzq-219-189-2.cablep.bezeqint.net (62.219.189.2)
114856 377.31 ms bzq-179-124-78.cust.bezeqint.net (212.179.124.78)
114867 377.35 ms ge-2-1-0.mpr1.lhr2.uk.above.net (195.66.224.76)
114878 377.35 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
114889 ...
1148910 536.51 ms ae5.cs3.lga5.us.eth.zayo.com (64.125.29.126)
1149011 503.08 ms ae0.cs2.lga5.us.eth.zayo.com (64.125.29.187)
1149112 502.92 ms ae4.cs2.dca2.us.eth.zayo.com (64.125.29.31)
1149213 502.86 ms ae3.cs2.iah1.us.eth.zayo.com (64.125.29.45)
1149314 502.96 ms ae2.mpr2.aus1.us.zip.zayo.com (64.125.31.250)
1149415 502.97 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
1149516 502.91 ms 209.66.92.122.IPYX-085258-900-ZYO.above.net (209.66.92.122)
1149617 502.92 ms po10.gw2.pod1.tx1.datafoundry.net (209.99.14.106)
1149718 502.97 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1149819 635.79 ms 199.191.50.92
11499##################################################################################################################################
11500Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:39 EST
11501Nmap scan report for 199.191.50.92
11502Host is up (0.25s latency).
11503
11504PORT STATE SERVICE VERSION
1150569/tcp filtered tftp
1150669/udp open|filtered tftp
11507Too many fingerprints match this host to give specific OS details
11508Network Distance: 19 hops
11509
11510TRACEROUTE (using proto 1/icmp)
11511HOP RTT ADDRESS
115121 362.86 ms 10.246.204.1
115132 362.91 ms 160.116.0.161
115143 362.90 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
115154 362.92 ms bzq-219-189-185.dsl.bezeqint.net (62.219.189.185)
115165 362.94 ms bzq-219-189-2.dsl.bezeqint.net (62.219.189.2)
115176 362.96 ms bzq-179-124-78.cust.bezeqint.net (212.179.124.78)
115187 362.98 ms ge-2-1-0.mpr1.lhr2.uk.above.net (195.66.224.76)
115198 244.75 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
115209 ...
1152110 363.08 ms ae5.cs3.lga5.us.eth.zayo.com (64.125.29.126)
1152211 522.30 ms ae0.cs2.lga5.us.eth.zayo.com (64.125.29.187)
1152312 410.87 ms ae4.cs2.dca2.us.eth.zayo.com (64.125.29.31)
1152413 410.80 ms ae3.cs2.iah1.us.eth.zayo.com (64.125.29.45)
1152514 410.92 ms ae2.mpr2.aus1.us.zip.zayo.com (64.125.31.250)
1152615 410.93 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
1152716 410.87 ms 209.66.92.122.IPYX-085258-900-ZYO.above.net (209.66.92.122)
1152817 410.84 ms po10.gw2.pod1.tx1.datafoundry.net (209.99.14.106)
1152918 410.94 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1153019 410.87 ms 199.191.50.92
11531###################################################################################################################################
11532http://199.191.50.92 [302 Found] Apache, Cookies[vsid], Country[RESERVED][ZZ], HTTPServer[Apache], HttpOnly[vsid], IP[199.191.50.92], RedirectLocation[http://unifwd.com]
11533http://unifwd.com [200 OK] Apache, Cookies[vsid], Country[VIRGIN ISLANDS (BRITISH)][VG], Frame, HTTPServer[Apache], HttpOnly[vsid], IP[208.91.196.46], Script[text/javascript], UncommonHeaders[x-adblock-key,cteonnt-length], X-UA-Compatible[IE=EmulateIE7]
11534##################################################################################################################################
11535Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 16:44 EST
11536Nmap scan report for 199.191.50.92
11537Host is up (0.099s latency).
11538
11539PORT STATE SERVICE VERSION
11540123/tcp filtered ntp
11541123/udp open|filtered ntp
11542Too many fingerprints match this host to give specific OS details
11543Network Distance: 19 hops
11544
11545TRACEROUTE (using proto 1/icmp)
11546HOP RTT ADDRESS
115471 338.38 ms 10.246.204.1
115482 338.46 ms 160.116.0.161
115493 338.42 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
115504 338.44 ms bzq-219-189-185.dsl.bezeqint.net (62.219.189.185)
115515 338.47 ms bzq-219-189-2.dsl.bezeqint.net (62.219.189.2)
115526 368.53 ms bzq-179-124-78.cust.bezeqint.net (212.179.124.78)
115537 526.78 ms ge-2-1-0.mpr1.lhr2.uk.above.net (195.66.224.76)
115548 526.73 ms ae11.mpr2.lhr2.uk.zip.zayo.com (64.125.30.52)
115559 ...
1155610 526.85 ms ae5.cs3.lga5.us.eth.zayo.com (64.125.29.126)
1155711 532.94 ms ae0.cs2.lga5.us.eth.zayo.com (64.125.29.187)
1155812 533.02 ms ae4.cs2.dca2.us.eth.zayo.com (64.125.29.31)
1155913 532.92 ms ae3.cs2.iah1.us.eth.zayo.com (64.125.29.45)
1156014 533.21 ms ae2.mpr2.aus1.us.zip.zayo.com (64.125.31.250)
1156115 533.22 ms ae4.er1.aus3.us.zip.zayo.com (64.125.31.27)
1156216 502.69 ms 209.66.92.122.IPYX-085258-900-ZYO.above.net (209.66.92.122)
1156317 502.24 ms po10.gw2.pod1.tx1.datafoundry.net (209.99.14.106)
1156418 502.36 ms 209-99-48-54.fwd.datafoundry.com (209.99.48.54)
1156519 502.21 ms 199.191.50.92
11566###################################################################################################################################
11567Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-10 17:05 EST
11568Nmap scan report for 199.191.50.92
11569Host is up (0.35s latency).
11570
11571PORT STATE SERVICE VERSION
1157253/tcp open tcpwrapped
1157367/tcp filtered dhcps
1157468/tcp filtered dhcpc
1157569/tcp filtered tftp
1157688/tcp filtered kerberos-sec
11577123/tcp filtered ntp
11578137/tcp filtered netbios-ns
11579138/tcp filtered netbios-dgm
11580139/tcp closed netbios-ssn
11581161/tcp filtered snmp
11582162/tcp filtered snmptrap
11583389/tcp filtered ldap
11584520/tcp filtered efs
115852049/tcp filtered nfs
1158653/udp open mdns DNS-based service discovery
11587| dns-nsid:
11588| NSID: d9-dns-2.srv.media.net (64392d646e732d322e7372762e6d656469612e6e6574)
11589|_ id.server: d9-dns-2.srv.media.net
1159067/udp open|filtered dhcps
1159168/udp open|filtered dhcpc
1159269/udp open|filtered tftp
1159388/udp open|filtered kerberos-sec
11594123/udp open|filtered ntp
11595137/udp filtered netbios-ns
11596138/udp filtered netbios-dgm
11597139/udp open|filtered netbios-ssn
11598161/udp open|filtered snmp
11599162/udp open|filtered snmptrap
11600389/udp open|filtered ldap
11601520/udp open|filtered route
116022049/udp open|filtered nfs
11603Device type: general purpose
11604Running (JUST GUESSING): Linux 2.6.X (91%)
11605OS CPE: cpe:/o:linux:linux_kernel:2.6
11606Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (91%)
11607No exact OS matches for host (test conditions non-ideal).
11608Network Distance: 2 hops
11609
11610TRACEROUTE (using port 139/tcp)
11611HOP RTT ADDRESS
116121 433.53 ms 10.246.204.1
116132 433.52 ms 199.191.50.92
11614##################################################################################################################################
11615Hosts
11616=====
11617
11618address mac name os_name os_flavor os_sp purpose info comments
11619------- --- ---- ------- --------- ----- ------- ---- --------
116208.113.216.185 Unknown device
1162123.194.8.156 a23-194-8-156.deploy.static.akamaitechnologies.com Unknown device
1162223.201.103.9 a23-201-103-9.deploy.static.akamaitechnologies.com embedded 6.X device
1162334.66.191.217 217.191.66.34.bc.googleusercontent.com Linux 2.4.X server
1162434.210.57.231 ec2-34-210-57-231.us-west-2.compute.amazonaws.com Linux 3.X server
1162545.60.80.235 Linux 3.X server
1162652.11.234.150 ec2-52-11-234-150.us-west-2.compute.amazonaws.com Linux 3.X server
1162752.35.54.14 ec2-52-35-54-14.us-west-2.compute.amazonaws.com Unknown device
1162852.198.183.13 ec2-52-198-183-13.ap-northeast-1.compute.amazonaws.co embedded device
1162954.73.84.17 ec2-54-73-84-17.eu-west-1.compute.amazonaws.com Unknown device
1163072.47.224.85 agaacqmame.c03.gridserver.com embedded device
1163180.82.79.116 no-reverse-dns-configured.com Linux 7.0 server
1163280.209.242.81 muhajeer.com Linux 3.X server
1163382.221.136.4 hekla.orangewebsite.com Unknown device
1163482.221.139.217 Unknown device
1163584.235.91.252 84-235-91-252.saudi.net.sa Unknown device
1163685.25.208.92 mail.suh-ev.de Linux 9.0 server
1163787.247.240.207 crayford.servers.prgn.misp.co.uk Android 5.X device
1163889.221.213.22 hc1-wd12.wedos.net Linux 2.6.X server
1163989.248.172.200 89-248-172-200.constellationservers.net Linux 8.0 server
1164093.89.20.20 Unknown device
1164193.95.228.158 vps-93-95-228-158.1984.is Linux 18.04 server
1164293.113.37.250 adsla250.ch-clienti.ro Linux 2.6.X server
1164393.174.93.84 Linux 3.X server
1164493.191.156.197 Unknown device
1164594.102.51.33 full-dark.net Linux 2.6.X server
11646104.148.49.2 embedded device
11647104.154.60.12 12.60.154.104.bc.googleusercontent.com Linux 2.6.X server
11648104.218.232.66 Linux 3.X server
11649104.244.74.54 embedded device
11650107.154.130.27 107.154.130.27.ip.incapdns.net Linux 3.X server
11651107.154.248.27 107.154.248.27.ip.incapdns.net Linux 3.X server
11652141.105.65.111 Linux 2.6.X server
11653147.237.0.206 embedded device
11654150.95.250.133 embedded device
11655151.139.243.11 Linux 4.X server
11656154.73.84.17 Unknown device
11657157.7.107.254 157-7-107-254.virt.lolipop.jp embedded device
11658159.89.0.72 Linux 16.04 server
11659160.153.72.166 ip-160-153-72-166.ip.secureserver.net Linux 3.X server
11660163.247.52.17 www.mtt.cl Linux 2.6.X server
11661163.247.96.10 Linux 2.6.X server
11662170.246.172.178 host-170-246-172-178.anacondaweb.com Linux 2.6.X server
11663180.222.81.193 bvdeuy193.secure.ne.jp Linux 2.6.X server
11664184.72.111.210 ec2-184-72-111-210.compute-1.amazonaws.com Linux 2.6.X server
11665185.2.4.98 lhcp1098.webapps.net embedded device
11666185.68.93.22 verbatim1981.example.com Unknown device
11667185.119.173.237 Linux 2.6.X server
11668186.67.91.110 ipj10-110.poderjudicial.cl Linux 2.6.X server
11669192.0.78.12 Linux 2.4.X server
11670192.0.78.13 Linux 2.6.X server
11671194.18.73.2 www.sakerhetspolisen.se Linux 2.6.X server
11672194.39.164.140 194.39.164.140.srvlist.ukfast.net Linux 3.X server
11673195.181.169.2 new-york-1.cdn77.com Linux 3.X server
11674199.191.50.92 Linux 2.6.X server
11675200.14.67.43 senado.cl Linux 2.6.X server
11676200.14.67.65 Linux 2.6.X server
11677200.35.157.77 srv77.talcaguia.cl Unknown device
11678201.131.38.40 Linux 2.6.X server
11679201.238.246.43 Unknown device
11680202.214.194.138 Linux 2.6.X server
11681202.238.130.103 Linux 2.6.X server
11682203.137.110.66 Unknown device
11683203.180.216.224 embedded device
11684203.183.218.244 Unknown device
11685205.134.171.80 acs-cd-86-ab-50.acs.ai.net Linux 16.04 server
11686208.113.216.185 apache2-rank.thomas-mckean.dreamhost.com Unknown device
11687208.113.220.218 apache2-xenon.accomack.dreamhost.com Unknown device
11688209.59.165.178 rabbit.ceilingsky.com Linux 2.6.X server
11689210.149.141.34 Unknown device
11690210.152.243.182 Unknown device
11691210.160.220.105 h105.sk3.estore.co.jp embedded device
11692210.160.220.113 h113.sk3.estore.co.jp embedded device
11693210.226.36.2 210-226-36-2.df.nttcomcloud.com Linux 2.6.X server
11694217.160.131.142 s18161039.onlinehome-server.info Linux 2.6.X server
11695###################################################################################################################################
11696Services
11697========
11698
11699host port proto name state info
11700---- ---- ----- ---- ----- ----
117018.113.216.185 25 tcp smtp closed
117028.113.216.185 53 tcp domain filtered
117038.113.216.185 53 udp domain unknown
117048.113.216.185 67 tcp dhcps filtered
117058.113.216.185 67 udp dhcps unknown
117068.113.216.185 68 tcp dhcpc filtered
117078.113.216.185 68 udp dhcpc unknown
117088.113.216.185 69 tcp tftp filtered
117098.113.216.185 69 udp tftp unknown
117108.113.216.185 88 tcp kerberos-sec filtered
117118.113.216.185 88 udp kerberos-sec unknown
117128.113.216.185 123 tcp ntp filtered
117138.113.216.185 123 udp ntp unknown
117148.113.216.185 137 tcp netbios-ns filtered
117158.113.216.185 137 udp netbios-ns filtered
117168.113.216.185 138 tcp netbios-dgm filtered
117178.113.216.185 138 udp netbios-dgm filtered
117188.113.216.185 139 tcp netbios-ssn closed
117198.113.216.185 139 udp netbios-ssn unknown
117208.113.216.185 161 tcp snmp filtered
117218.113.216.185 161 udp snmp unknown
117228.113.216.185 162 tcp snmptrap filtered
117238.113.216.185 162 udp snmptrap unknown
117248.113.216.185 389 tcp ldap filtered
117258.113.216.185 389 udp ldap unknown
117268.113.216.185 445 tcp microsoft-ds closed
117278.113.216.185 520 tcp efs filtered
117288.113.216.185 520 udp route unknown
117298.113.216.185 2049 tcp nfs filtered
117308.113.216.185 2049 udp nfs unknown
1173123.194.8.156 53 tcp domain filtered
1173223.194.8.156 53 udp domain unknown
1173323.194.8.156 67 tcp dhcps filtered
1173423.194.8.156 67 udp dhcps unknown
1173523.194.8.156 68 tcp dhcpc filtered
1173623.194.8.156 68 udp dhcpc unknown
1173723.194.8.156 69 tcp tftp filtered
1173823.194.8.156 69 udp tftp unknown
1173923.194.8.156 88 tcp kerberos-sec filtered
1174023.194.8.156 88 udp kerberos-sec unknown
1174123.194.8.156 123 tcp ntp filtered
1174223.194.8.156 123 udp ntp unknown
1174323.194.8.156 137 tcp netbios-ns filtered
1174423.194.8.156 137 udp netbios-ns filtered
1174523.194.8.156 138 tcp netbios-dgm filtered
1174623.194.8.156 138 udp netbios-dgm filtered
1174723.194.8.156 139 tcp netbios-ssn closed
1174823.194.8.156 139 udp netbios-ssn unknown
1174923.194.8.156 161 tcp snmp filtered
1175023.194.8.156 161 udp snmp unknown
1175123.194.8.156 162 tcp snmptrap filtered
1175223.194.8.156 162 udp snmptrap unknown
1175323.194.8.156 389 tcp ldap filtered
1175423.194.8.156 389 udp ldap unknown
1175523.194.8.156 520 tcp efs filtered
1175623.194.8.156 520 udp route unknown
1175723.194.8.156 2049 tcp nfs filtered
1175823.194.8.156 2049 udp nfs unknown
1175923.201.103.9 25 tcp smtp closed
1176023.201.103.9 53 tcp domain filtered
1176123.201.103.9 53 udp domain unknown
1176223.201.103.9 67 tcp dhcps filtered
1176323.201.103.9 67 udp dhcps unknown
1176423.201.103.9 68 tcp dhcpc filtered
1176523.201.103.9 68 udp dhcpc unknown
1176623.201.103.9 69 tcp tftp filtered
1176723.201.103.9 69 udp tftp unknown
1176823.201.103.9 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
1176923.201.103.9 88 tcp kerberos-sec filtered
1177023.201.103.9 88 udp kerberos-sec unknown
1177123.201.103.9 123 tcp ntp filtered
1177223.201.103.9 123 udp ntp unknown
1177323.201.103.9 137 tcp netbios-ns filtered
1177423.201.103.9 137 udp netbios-ns filtered
1177523.201.103.9 138 tcp netbios-dgm filtered
1177623.201.103.9 138 udp netbios-dgm filtered
1177723.201.103.9 139 tcp netbios-ssn closed
1177823.201.103.9 139 udp netbios-ssn unknown
1177923.201.103.9 161 tcp snmp filtered
1178023.201.103.9 161 udp snmp unknown
1178123.201.103.9 162 tcp snmptrap filtered
1178223.201.103.9 162 udp snmptrap unknown
1178323.201.103.9 389 tcp ldap filtered
1178423.201.103.9 389 udp ldap unknown
1178523.201.103.9 443 tcp ssl/http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
1178623.201.103.9 445 tcp microsoft-ds closed
1178723.201.103.9 520 tcp efs filtered
1178823.201.103.9 520 udp route unknown
1178923.201.103.9 2049 tcp nfs filtered
1179023.201.103.9 2049 udp nfs unknown
1179123.201.103.9 8883 tcp secure-mqtt open
1179234.66.191.217 25 tcp smtp closed
1179334.66.191.217 53 tcp domain filtered
1179434.66.191.217 53 udp domain unknown
1179534.66.191.217 67 tcp dhcps filtered
1179634.66.191.217 67 udp dhcps unknown
1179734.66.191.217 68 tcp dhcpc filtered
1179834.66.191.217 68 udp dhcpc unknown
1179934.66.191.217 69 tcp tftp filtered
1180034.66.191.217 69 udp tftp unknown
1180134.66.191.217 80 tcp http open nginx
1180234.66.191.217 88 tcp kerberos-sec filtered
1180334.66.191.217 88 udp kerberos-sec unknown
1180434.66.191.217 123 tcp ntp filtered
1180534.66.191.217 123 udp ntp unknown
1180634.66.191.217 137 tcp netbios-ns filtered
1180734.66.191.217 137 udp netbios-ns filtered
1180834.66.191.217 138 tcp netbios-dgm filtered
1180934.66.191.217 138 udp netbios-dgm filtered
1181034.66.191.217 139 tcp netbios-ssn closed
1181134.66.191.217 139 udp netbios-ssn unknown
1181234.66.191.217 161 tcp snmp filtered
1181334.66.191.217 161 udp snmp unknown
1181434.66.191.217 162 tcp snmptrap filtered
1181534.66.191.217 162 udp snmptrap unknown
1181634.66.191.217 389 tcp ldap filtered
1181734.66.191.217 389 udp ldap unknown
1181834.66.191.217 443 tcp ssl/http open nginx
1181934.66.191.217 445 tcp microsoft-ds closed
1182034.66.191.217 520 tcp efs filtered
1182134.66.191.217 520 udp route unknown
1182234.66.191.217 2049 tcp nfs filtered
1182334.66.191.217 2049 udp nfs unknown
1182434.66.191.217 2222 tcp ssh open ProFTPD mod_sftp 0.9.9 protocol 2.0
1182534.210.57.231 25 tcp smtp closed
1182634.210.57.231 53 tcp domain filtered
1182734.210.57.231 53 udp domain unknown
1182834.210.57.231 67 tcp dhcps filtered
1182934.210.57.231 67 udp dhcps unknown
1183034.210.57.231 68 tcp dhcpc filtered
1183134.210.57.231 68 udp dhcpc unknown
1183234.210.57.231 69 tcp tftp filtered
1183334.210.57.231 69 udp tftp unknown
1183434.210.57.231 80 tcp http open awselb/2.0
1183534.210.57.231 88 tcp kerberos-sec filtered
1183634.210.57.231 88 udp kerberos-sec unknown
1183734.210.57.231 123 tcp ntp filtered
1183834.210.57.231 123 udp ntp unknown
1183934.210.57.231 137 tcp netbios-ns filtered
1184034.210.57.231 137 udp netbios-ns filtered
1184134.210.57.231 138 tcp netbios-dgm filtered
1184234.210.57.231 138 udp netbios-dgm filtered
1184334.210.57.231 139 tcp netbios-ssn closed
1184434.210.57.231 139 udp netbios-ssn unknown
1184534.210.57.231 161 tcp snmp filtered
1184634.210.57.231 161 udp snmp unknown
1184734.210.57.231 162 tcp snmptrap filtered
1184834.210.57.231 162 udp snmptrap unknown
1184934.210.57.231 389 tcp ldap filtered
1185034.210.57.231 389 udp ldap unknown
1185134.210.57.231 443 tcp ssl/http open nginx 1.10.3
1185234.210.57.231 445 tcp microsoft-ds closed
1185334.210.57.231 520 tcp efs filtered
1185434.210.57.231 520 udp route unknown
1185534.210.57.231 2049 tcp nfs filtered
1185634.210.57.231 2049 udp nfs unknown
1185745.60.80.235 53 tcp domain open
1185845.60.80.235 53 udp domain open
1185945.60.80.235 67 udp dhcps unknown
1186045.60.80.235 68 udp dhcpc unknown
1186145.60.80.235 69 udp tftp unknown
1186245.60.80.235 80 tcp http open Incapsula CDN httpd
1186345.60.80.235 81 tcp http open Incapsula CDN httpd
1186445.60.80.235 85 tcp http open Incapsula CDN httpd
1186545.60.80.235 88 tcp http open Incapsula CDN httpd
1186645.60.80.235 88 udp kerberos-sec unknown
1186745.60.80.235 123 udp ntp unknown
1186845.60.80.235 139 udp netbios-ssn unknown
1186945.60.80.235 161 udp snmp unknown
1187045.60.80.235 162 udp snmptrap unknown
1187145.60.80.235 389 tcp ssl/http open Incapsula CDN httpd
1187245.60.80.235 389 udp ldap unknown
1187345.60.80.235 443 tcp ssl/http open Incapsula CDN httpd
1187445.60.80.235 444 tcp ssl/http open Incapsula CDN httpd
1187545.60.80.235 446 tcp http open Incapsula CDN httpd
1187645.60.80.235 520 udp route unknown
1187745.60.80.235 587 tcp http open Incapsula CDN httpd
1187845.60.80.235 631 tcp http open Incapsula CDN httpd
1187945.60.80.235 888 tcp http open Incapsula CDN httpd
1188045.60.80.235 995 tcp ssl/http open Incapsula CDN httpd
1188145.60.80.235 998 tcp ssl/http open Incapsula CDN httpd
1188245.60.80.235 999 tcp http open Incapsula CDN httpd
1188345.60.80.235 1000 tcp http open Incapsula CDN httpd
1188445.60.80.235 1024 tcp http open Incapsula CDN httpd
1188545.60.80.235 1103 tcp http open Incapsula CDN httpd
1188645.60.80.235 1234 tcp http open Incapsula CDN httpd
1188745.60.80.235 1433 tcp http open Incapsula CDN httpd
1188845.60.80.235 1494 tcp http open Incapsula CDN httpd
1188945.60.80.235 2000 tcp ssl/http open Incapsula CDN httpd
1189045.60.80.235 2001 tcp http open Incapsula CDN httpd
1189145.60.80.235 2049 tcp http open Incapsula CDN httpd
1189245.60.80.235 2049 udp nfs unknown
1189345.60.80.235 2067 tcp http open Incapsula CDN httpd
1189445.60.80.235 2100 tcp ssl/http open Incapsula CDN httpd
1189545.60.80.235 2222 tcp http open Incapsula CDN httpd
1189645.60.80.235 2598 tcp http open Incapsula CDN httpd
1189745.60.80.235 3000 tcp http open Incapsula CDN httpd
1189845.60.80.235 3050 tcp http open Incapsula CDN httpd
1189945.60.80.235 3057 tcp http open Incapsula CDN httpd
1190045.60.80.235 3299 tcp http open Incapsula CDN httpd
1190145.60.80.235 3306 tcp ssl/http open Incapsula CDN httpd
1190245.60.80.235 3333 tcp http open Incapsula CDN httpd
1190345.60.80.235 3389 tcp ssl/http open Incapsula CDN httpd
1190445.60.80.235 3500 tcp http open Incapsula CDN httpd
1190545.60.80.235 3790 tcp http open Incapsula CDN httpd
1190645.60.80.235 4000 tcp http open Incapsula CDN httpd
1190745.60.80.235 4444 tcp ssl/http open Incapsula CDN httpd
1190845.60.80.235 4445 tcp ssl/http open Incapsula CDN httpd
1190945.60.80.235 5000 tcp http open Incapsula CDN httpd
1191045.60.80.235 5009 tcp http open Incapsula CDN httpd
1191145.60.80.235 5060 tcp ssl/http open Incapsula CDN httpd
1191245.60.80.235 5061 tcp ssl/http open Incapsula CDN httpd
1191345.60.80.235 5227 tcp ssl/http open Incapsula CDN httpd
1191445.60.80.235 5247 tcp ssl/http open Incapsula CDN httpd
1191545.60.80.235 5250 tcp ssl/http open Incapsula CDN httpd
1191645.60.80.235 5555 tcp http open Incapsula CDN httpd
1191745.60.80.235 5900 tcp http open Incapsula CDN httpd
1191845.60.80.235 5901 tcp ssl/http open Incapsula CDN httpd
1191945.60.80.235 5902 tcp ssl/http open Incapsula CDN httpd
1192045.60.80.235 5903 tcp ssl/http open Incapsula CDN httpd
1192145.60.80.235 5904 tcp ssl/http open Incapsula CDN httpd
1192245.60.80.235 5905 tcp ssl/http open Incapsula CDN httpd
1192345.60.80.235 5906 tcp ssl/http open Incapsula CDN httpd
1192445.60.80.235 5907 tcp ssl/http open Incapsula CDN httpd
1192545.60.80.235 5908 tcp ssl/http open Incapsula CDN httpd
1192645.60.80.235 5909 tcp ssl/http open Incapsula CDN httpd
1192745.60.80.235 5910 tcp ssl/http open Incapsula CDN httpd
1192845.60.80.235 5920 tcp ssl/http open Incapsula CDN httpd
1192945.60.80.235 5984 tcp ssl/http open Incapsula CDN httpd
1193045.60.80.235 5985 tcp http open Incapsula CDN httpd
1193145.60.80.235 5986 tcp ssl/http open Incapsula CDN httpd
1193245.60.80.235 5999 tcp ssl/http open Incapsula CDN httpd
1193345.60.80.235 6000 tcp http open Incapsula CDN httpd
1193445.60.80.235 6060 tcp http open Incapsula CDN httpd
1193545.60.80.235 6161 tcp http open Incapsula CDN httpd
1193645.60.80.235 6379 tcp http open Incapsula CDN httpd
1193745.60.80.235 6661 tcp ssl/http open Incapsula CDN httpd
1193845.60.80.235 6789 tcp http open Incapsula CDN httpd
1193945.60.80.235 7001 tcp http open Incapsula CDN httpd
1194045.60.80.235 7021 tcp http open Incapsula CDN httpd
1194145.60.80.235 7071 tcp ssl/http open Incapsula CDN httpd
1194245.60.80.235 7080 tcp http open Incapsula CDN httpd
1194345.60.80.235 7272 tcp ssl/http open Incapsula CDN httpd
1194445.60.80.235 7443 tcp ssl/http open Incapsula CDN httpd
1194545.60.80.235 7700 tcp http open Incapsula CDN httpd
1194645.60.80.235 7777 tcp http open Incapsula CDN httpd
1194745.60.80.235 7778 tcp http open Incapsula CDN httpd
1194845.60.80.235 8000 tcp http open Incapsula CDN httpd
1194945.60.80.235 8001 tcp http open Incapsula CDN httpd
1195045.60.80.235 8008 tcp http open Incapsula CDN httpd
1195145.60.80.235 8014 tcp http open Incapsula CDN httpd
1195245.60.80.235 8020 tcp http open Incapsula CDN httpd
1195345.60.80.235 8023 tcp http open Incapsula CDN httpd
1195445.60.80.235 8028 tcp http open Incapsula CDN httpd
1195545.60.80.235 8030 tcp http open Incapsula CDN httpd
1195645.60.80.235 8050 tcp http open Incapsula CDN httpd
1195745.60.80.235 8051 tcp http open Incapsula CDN httpd
1195845.60.80.235 8080 tcp http open Incapsula CDN httpd
1195945.60.80.235 8081 tcp http open Incapsula CDN httpd
1196045.60.80.235 8082 tcp http open Incapsula CDN httpd
1196145.60.80.235 8085 tcp http open Incapsula CDN httpd
1196245.60.80.235 8086 tcp http open Incapsula CDN httpd
1196345.60.80.235 8087 tcp http open Incapsula CDN httpd
1196445.60.80.235 8088 tcp http open Incapsula CDN httpd
1196545.60.80.235 8090 tcp http open Incapsula CDN httpd
1196645.60.80.235 8091 tcp http open Incapsula CDN httpd
1196745.60.80.235 8095 tcp http open Incapsula CDN httpd
1196845.60.80.235 8101 tcp http open Incapsula CDN httpd
1196945.60.80.235 8161 tcp http open Incapsula CDN httpd
1197045.60.80.235 8180 tcp http open Incapsula CDN httpd
1197145.60.80.235 8222 tcp http open Incapsula CDN httpd
1197245.60.80.235 8333 tcp http open Incapsula CDN httpd
1197345.60.80.235 8443 tcp ssl/http open Incapsula CDN httpd
1197445.60.80.235 8444 tcp http open Incapsula CDN httpd
1197545.60.80.235 8445 tcp http open Incapsula CDN httpd
1197645.60.80.235 8503 tcp ssl/http open Incapsula CDN httpd
1197745.60.80.235 8686 tcp http open Incapsula CDN httpd
1197845.60.80.235 8787 tcp http open Incapsula CDN httpd
1197945.60.80.235 8800 tcp http open Incapsula CDN httpd
1198045.60.80.235 8812 tcp http open Incapsula CDN httpd
1198145.60.80.235 8834 tcp http open Incapsula CDN httpd
1198245.60.80.235 8880 tcp http open Incapsula CDN httpd
1198345.60.80.235 8888 tcp http open Incapsula CDN httpd
1198445.60.80.235 8890 tcp http open Incapsula CDN httpd
1198545.60.80.235 8899 tcp http open Incapsula CDN httpd
1198645.60.80.235 8901 tcp http open Incapsula CDN httpd
1198745.60.80.235 8902 tcp http open Incapsula CDN httpd
1198845.60.80.235 8999 tcp http open Incapsula CDN httpd
1198945.60.80.235 9000 tcp http open Incapsula CDN httpd
1199045.60.80.235 9001 tcp http open Incapsula CDN httpd
1199145.60.80.235 9002 tcp http open Incapsula CDN httpd
1199245.60.80.235 9003 tcp http open Incapsula CDN httpd
1199345.60.80.235 9004 tcp http open Incapsula CDN httpd
1199445.60.80.235 9005 tcp http open Incapsula CDN httpd
1199545.60.80.235 9010 tcp http open Incapsula CDN httpd
1199645.60.80.235 9050 tcp http open Incapsula CDN httpd
1199745.60.80.235 9080 tcp http open Incapsula CDN httpd
1199845.60.80.235 9081 tcp ssl/http open Incapsula CDN httpd
1199945.60.80.235 9084 tcp http open Incapsula CDN httpd
1200045.60.80.235 9090 tcp http open Incapsula CDN httpd
1200145.60.80.235 9099 tcp http open Incapsula CDN httpd
1200245.60.80.235 9100 tcp jetdirect open
1200345.60.80.235 9111 tcp http open Incapsula CDN httpd
1200445.60.80.235 9200 tcp http open Incapsula CDN httpd
1200545.60.80.235 9300 tcp http open Incapsula CDN httpd
1200645.60.80.235 9500 tcp http open Incapsula CDN httpd
1200745.60.80.235 9711 tcp ssl/http open Incapsula CDN httpd
1200845.60.80.235 9991 tcp http open Incapsula CDN httpd
1200945.60.80.235 9999 tcp http open Incapsula CDN httpd
1201045.60.80.235 10000 tcp http open Incapsula CDN httpd
1201152.11.234.150 25 tcp smtp closed
1201252.11.234.150 53 tcp domain filtered
1201352.11.234.150 53 udp domain unknown
1201452.11.234.150 67 tcp dhcps filtered
1201552.11.234.150 67 udp dhcps unknown
1201652.11.234.150 68 tcp dhcpc filtered
1201752.11.234.150 68 udp dhcpc unknown
1201852.11.234.150 69 tcp tftp filtered
1201952.11.234.150 69 udp tftp unknown
1202052.11.234.150 80 tcp http open awselb/2.0
1202152.11.234.150 88 tcp kerberos-sec filtered
1202252.11.234.150 88 udp kerberos-sec unknown
1202352.11.234.150 123 tcp ntp filtered
1202452.11.234.150 123 udp ntp unknown
1202552.11.234.150 137 tcp netbios-ns filtered
1202652.11.234.150 137 udp netbios-ns filtered
1202752.11.234.150 138 tcp netbios-dgm filtered
1202852.11.234.150 138 udp netbios-dgm filtered
1202952.11.234.150 139 tcp netbios-ssn closed
1203052.11.234.150 139 udp netbios-ssn unknown
1203152.11.234.150 161 tcp snmp filtered
1203252.11.234.150 161 udp snmp unknown
1203352.11.234.150 162 tcp snmptrap filtered
1203452.11.234.150 162 udp snmptrap unknown
1203552.11.234.150 389 tcp ldap filtered
1203652.11.234.150 389 udp ldap unknown
1203752.11.234.150 443 tcp ssl/http open nginx 1.10.3
1203852.11.234.150 445 tcp microsoft-ds closed
1203952.11.234.150 520 tcp efs filtered
1204052.11.234.150 520 udp route unknown
1204152.11.234.150 2049 tcp nfs filtered
1204252.11.234.150 2049 udp nfs unknown
1204352.35.54.14 53 tcp domain filtered
1204452.35.54.14 53 udp domain unknown
1204552.35.54.14 67 tcp dhcps filtered
1204652.35.54.14 67 udp dhcps unknown
1204752.35.54.14 68 tcp dhcpc filtered
1204852.35.54.14 68 udp dhcpc unknown
1204952.35.54.14 69 tcp tftp filtered
1205052.35.54.14 69 udp tftp unknown
1205152.35.54.14 88 tcp kerberos-sec filtered
1205252.35.54.14 88 udp kerberos-sec unknown
1205352.35.54.14 123 tcp ntp filtered
1205452.35.54.14 123 udp ntp unknown
1205552.35.54.14 137 tcp netbios-ns filtered
1205652.35.54.14 137 udp netbios-ns filtered
1205752.35.54.14 138 tcp netbios-dgm filtered
1205852.35.54.14 138 udp netbios-dgm filtered
1205952.35.54.14 139 tcp netbios-ssn closed
1206052.35.54.14 139 udp netbios-ssn unknown
1206152.35.54.14 161 tcp snmp filtered
1206252.35.54.14 161 udp snmp unknown
1206352.35.54.14 162 tcp snmptrap filtered
1206452.35.54.14 162 udp snmptrap unknown
1206552.35.54.14 389 tcp ldap filtered
1206652.35.54.14 389 udp ldap unknown
1206752.35.54.14 520 tcp efs filtered
1206852.35.54.14 520 udp route unknown
1206952.35.54.14 2049 tcp nfs filtered
1207052.35.54.14 2049 udp nfs unknown
1207152.198.183.13 25 tcp smtp closed
1207252.198.183.13 53 tcp domain filtered
1207352.198.183.13 53 udp domain unknown
1207452.198.183.13 67 tcp dhcps filtered
1207552.198.183.13 67 udp dhcps unknown
1207652.198.183.13 68 tcp dhcpc filtered
1207752.198.183.13 68 udp dhcpc unknown
1207852.198.183.13 69 tcp tftp filtered
1207952.198.183.13 69 udp tftp unknown
1208052.198.183.13 80 tcp http open nginx
1208152.198.183.13 88 tcp kerberos-sec filtered
1208252.198.183.13 88 udp kerberos-sec unknown
1208352.198.183.13 123 tcp ntp filtered
1208452.198.183.13 123 udp ntp unknown
1208552.198.183.13 137 tcp netbios-ns filtered
1208652.198.183.13 137 udp netbios-ns filtered
1208752.198.183.13 138 tcp netbios-dgm filtered
1208852.198.183.13 138 udp netbios-dgm filtered
1208952.198.183.13 139 tcp netbios-ssn closed
1209052.198.183.13 139 udp netbios-ssn unknown
1209152.198.183.13 161 tcp snmp filtered
1209252.198.183.13 161 udp snmp unknown
1209352.198.183.13 162 tcp snmptrap filtered
1209452.198.183.13 162 udp snmptrap unknown
1209552.198.183.13 389 tcp ldap filtered
1209652.198.183.13 389 udp ldap unknown
1209752.198.183.13 443 tcp ssl/http open nginx
1209852.198.183.13 445 tcp microsoft-ds closed
1209952.198.183.13 520 tcp efs filtered
1210052.198.183.13 520 udp route unknown
1210152.198.183.13 2049 tcp nfs filtered
1210252.198.183.13 2049 udp nfs unknown
1210354.73.84.17 25 tcp smtp closed
1210454.73.84.17 53 tcp domain filtered
1210554.73.84.17 53 udp domain unknown
1210654.73.84.17 67 tcp dhcps filtered
1210754.73.84.17 67 udp dhcps unknown
1210854.73.84.17 68 tcp dhcpc filtered
1210954.73.84.17 68 udp dhcpc unknown
1211054.73.84.17 69 tcp tftp filtered
1211154.73.84.17 69 udp tftp unknown
1211254.73.84.17 88 tcp kerberos-sec filtered
1211354.73.84.17 88 udp kerberos-sec unknown
1211454.73.84.17 123 tcp ntp filtered
1211554.73.84.17 123 udp ntp unknown
1211654.73.84.17 137 tcp netbios-ns filtered
1211754.73.84.17 137 udp netbios-ns filtered
1211854.73.84.17 138 tcp netbios-dgm filtered
1211954.73.84.17 138 udp netbios-dgm filtered
1212054.73.84.17 139 tcp netbios-ssn closed
1212154.73.84.17 139 udp netbios-ssn unknown
1212254.73.84.17 161 tcp snmp filtered
1212354.73.84.17 161 udp snmp unknown
1212454.73.84.17 162 tcp snmptrap filtered
1212554.73.84.17 162 udp snmptrap unknown
1212654.73.84.17 389 tcp ldap filtered
1212754.73.84.17 389 udp ldap unknown
1212854.73.84.17 445 tcp microsoft-ds closed
1212954.73.84.17 520 tcp efs filtered
1213054.73.84.17 520 udp route unknown
1213154.73.84.17 2049 tcp nfs filtered
1213254.73.84.17 2049 udp nfs unknown
1213372.47.224.85 25 tcp smtp closed
1213472.47.224.85 53 tcp domain filtered
1213572.47.224.85 53 udp domain unknown
1213672.47.224.85 67 tcp dhcps filtered
1213772.47.224.85 67 udp dhcps unknown
1213872.47.224.85 68 tcp dhcpc filtered
1213972.47.224.85 68 udp dhcpc unknown
1214072.47.224.85 69 tcp tftp filtered
1214172.47.224.85 69 udp tftp unknown
1214272.47.224.85 80 tcp http open Apache httpd 2.4.39
1214372.47.224.85 88 tcp kerberos-sec filtered
1214472.47.224.85 88 udp kerberos-sec unknown
1214572.47.224.85 110 tcp pop3 open Dovecot pop3d
1214672.47.224.85 123 tcp ntp filtered
1214772.47.224.85 123 udp ntp unknown
1214872.47.224.85 137 tcp netbios-ns filtered
1214972.47.224.85 137 udp netbios-ns filtered
1215072.47.224.85 138 tcp netbios-dgm filtered
1215172.47.224.85 138 udp netbios-dgm filtered
1215272.47.224.85 139 tcp netbios-ssn closed
1215372.47.224.85 139 udp netbios-ssn unknown
1215472.47.224.85 143 tcp imap open Dovecot imapd
1215572.47.224.85 161 tcp snmp filtered
1215672.47.224.85 161 udp snmp unknown
1215772.47.224.85 162 tcp snmptrap filtered
1215872.47.224.85 162 udp snmptrap unknown
1215972.47.224.85 389 tcp ldap filtered
1216072.47.224.85 389 udp ldap unknown
1216172.47.224.85 443 tcp ssl/http open nginx 1.16.1
1216272.47.224.85 445 tcp microsoft-ds closed
1216372.47.224.85 465 tcp ssl/smtp open Exim smtpd 4.84_2
1216472.47.224.85 520 tcp efs filtered
1216572.47.224.85 520 udp route unknown
1216672.47.224.85 587 tcp smtp open Exim smtpd 4.84_2
1216772.47.224.85 993 tcp ssl/imaps open
1216872.47.224.85 995 tcp ssl/pop3s open
1216972.47.224.85 2049 tcp nfs filtered
1217072.47.224.85 2049 udp nfs unknown
1217180.82.79.116 21 tcp ftp open 220 (vsFTPd 3.0.2)\x0d\x0a
1217280.82.79.116 22 tcp ssh open SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u6
1217380.82.79.116 53 tcp domain open ISC BIND 9.8.4-rpz2+rl005.12-P1
1217480.82.79.116 53 udp domain open ISC BIND 9.8.4-rpz2+rl005.12-P1
1217580.82.79.116 67 tcp dhcps closed
1217680.82.79.116 67 udp dhcps closed
1217780.82.79.116 68 tcp dhcpc closed
1217880.82.79.116 68 udp dhcpc closed
1217980.82.79.116 69 tcp tftp closed
1218080.82.79.116 69 udp tftp unknown
1218180.82.79.116 88 tcp kerberos-sec closed
1218280.82.79.116 88 udp kerberos-sec unknown
1218380.82.79.116 123 tcp ntp closed
1218480.82.79.116 123 udp ntp unknown
1218580.82.79.116 137 tcp netbios-ns closed
1218680.82.79.116 137 udp netbios-ns filtered
1218780.82.79.116 138 tcp netbios-dgm closed
1218880.82.79.116 138 udp netbios-dgm filtered
1218980.82.79.116 139 tcp netbios-ssn closed
1219080.82.79.116 139 udp netbios-ssn unknown
1219180.82.79.116 161 tcp snmp closed
1219280.82.79.116 161 udp snmp closed
1219380.82.79.116 162 tcp snmptrap closed
1219480.82.79.116 162 udp snmptrap closed
1219580.82.79.116 389 tcp ldap closed
1219680.82.79.116 389 udp ldap closed
1219780.82.79.116 520 tcp efs closed
1219880.82.79.116 520 udp route closed
1219980.82.79.116 2049 tcp nfs closed
1220080.82.79.116 2049 udp nfs unknown
1220180.209.242.81 21 tcp ftp open 220 FTP Server ready.\x0d\x0a
1220280.209.242.81 22 tcp ssh open SSH-2.0-OpenSSH_7.4
1220380.209.242.81 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
1220480.209.242.81 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
1220580.209.242.81 67 tcp dhcps filtered
1220680.209.242.81 67 udp dhcps unknown
1220780.209.242.81 68 tcp dhcpc filtered
1220880.209.242.81 68 udp dhcpc unknown
1220980.209.242.81 69 tcp tftp filtered
1221080.209.242.81 69 udp tftp unknown
1221180.209.242.81 88 tcp kerberos-sec filtered
1221280.209.242.81 88 udp kerberos-sec unknown
1221380.209.242.81 123 tcp ntp filtered
1221480.209.242.81 123 udp ntp unknown
1221580.209.242.81 137 tcp netbios-ns filtered
1221680.209.242.81 137 udp netbios-ns filtered
1221780.209.242.81 138 tcp netbios-dgm filtered
1221880.209.242.81 138 udp netbios-dgm filtered
1221980.209.242.81 139 tcp netbios-ssn closed
1222080.209.242.81 139 udp netbios-ssn unknown
1222180.209.242.81 161 tcp snmp filtered
1222280.209.242.81 161 udp snmp unknown
1222380.209.242.81 162 tcp snmptrap filtered
1222480.209.242.81 162 udp snmptrap unknown
1222580.209.242.81 389 tcp ldap filtered
1222680.209.242.81 389 udp ldap filtered
1222780.209.242.81 520 tcp efs filtered
1222880.209.242.81 520 udp route unknown
1222980.209.242.81 2049 tcp nfs filtered
1223080.209.242.81 2049 udp nfs unknown
1223182.221.136.4 21 tcp ftp open Your connection to this server has been blocked in this server's firewall.\x0d\x0aYou need to contact the server owner for further information.\x0d\x0a
1223282.221.136.4 53 tcp domain filtered
1223382.221.136.4 53 udp domain unknown
1223482.221.136.4 67 tcp dhcps filtered
1223582.221.136.4 67 udp dhcps unknown
1223682.221.136.4 68 tcp dhcpc filtered
1223782.221.136.4 68 udp dhcpc unknown
1223882.221.136.4 69 tcp tftp filtered
1223982.221.136.4 69 udp tftp unknown
1224082.221.136.4 88 tcp kerberos-sec filtered
1224182.221.136.4 88 udp kerberos-sec unknown
1224282.221.136.4 123 tcp ntp filtered
1224382.221.136.4 123 udp ntp unknown
1224482.221.136.4 137 tcp netbios-ns filtered
1224582.221.136.4 137 udp netbios-ns filtered
1224682.221.136.4 138 tcp netbios-dgm filtered
1224782.221.136.4 138 udp netbios-dgm filtered
1224882.221.136.4 139 tcp netbios-ssn closed
1224982.221.136.4 139 udp netbios-ssn unknown
1225082.221.136.4 161 tcp snmp filtered
1225182.221.136.4 161 udp snmp unknown
1225282.221.136.4 162 tcp snmptrap filtered
1225382.221.136.4 162 udp snmptrap unknown
1225482.221.136.4 389 tcp ldap filtered
1225582.221.136.4 389 udp ldap unknown
1225682.221.136.4 520 tcp efs filtered
1225782.221.136.4 520 udp route unknown
1225882.221.136.4 2049 tcp nfs filtered
1225982.221.136.4 2049 udp nfs unknown
1226082.221.139.217 22 tcp ssh open SSH-2.0-OpenSSH_5.3
1226184.235.91.252 25 tcp smtp closed
1226284.235.91.252 53 tcp domain filtered
1226384.235.91.252 53 udp domain unknown
1226484.235.91.252 67 tcp dhcps filtered
1226584.235.91.252 67 udp dhcps unknown
1226684.235.91.252 68 tcp dhcpc filtered
1226784.235.91.252 68 udp dhcpc unknown
1226884.235.91.252 69 tcp tftp filtered
1226984.235.91.252 69 udp tftp unknown
1227084.235.91.252 88 tcp kerberos-sec filtered
1227184.235.91.252 88 udp kerberos-sec unknown
1227284.235.91.252 123 tcp ntp filtered
1227384.235.91.252 123 udp ntp unknown
1227484.235.91.252 137 tcp netbios-ns filtered
1227584.235.91.252 137 udp netbios-ns filtered
1227684.235.91.252 138 tcp netbios-dgm filtered
1227784.235.91.252 138 udp netbios-dgm filtered
1227884.235.91.252 139 tcp netbios-ssn closed
1227984.235.91.252 139 udp netbios-ssn unknown
1228084.235.91.252 161 tcp snmp filtered
1228184.235.91.252 161 udp snmp unknown
1228284.235.91.252 162 tcp snmptrap filtered
1228384.235.91.252 162 udp snmptrap unknown
1228484.235.91.252 389 tcp ldap filtered
1228584.235.91.252 389 udp ldap unknown
1228684.235.91.252 445 tcp microsoft-ds closed
1228784.235.91.252 520 tcp efs filtered
1228884.235.91.252 520 udp route unknown
1228984.235.91.252 2049 tcp nfs filtered
1229084.235.91.252 2049 udp nfs unknown
1229185.25.208.92 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7
1229285.25.208.92 53 tcp domain closed
1229385.25.208.92 53 udp domain closed
1229485.25.208.92 67 tcp dhcps closed
1229585.25.208.92 67 udp dhcps closed
1229685.25.208.92 68 tcp dhcpc closed
1229785.25.208.92 68 udp dhcpc closed
1229885.25.208.92 69 tcp tftp closed
1229985.25.208.92 69 udp tftp unknown
1230085.25.208.92 88 tcp kerberos-sec closed
1230185.25.208.92 88 udp kerberos-sec unknown
1230285.25.208.92 123 tcp ntp closed
1230385.25.208.92 123 udp ntp open
1230485.25.208.92 137 tcp netbios-ns closed
1230585.25.208.92 137 udp netbios-ns filtered
1230685.25.208.92 138 tcp netbios-dgm closed
1230785.25.208.92 138 udp netbios-dgm filtered
1230885.25.208.92 139 tcp netbios-ssn closed
1230985.25.208.92 139 udp netbios-ssn closed
1231085.25.208.92 161 tcp snmp closed
1231185.25.208.92 161 udp snmp closed
1231285.25.208.92 162 tcp snmptrap closed
1231385.25.208.92 162 udp snmptrap closed
1231485.25.208.92 389 tcp ldap closed
1231585.25.208.92 389 udp ldap unknown
1231685.25.208.92 520 tcp efs closed
1231785.25.208.92 520 udp route closed
1231885.25.208.92 2049 tcp nfs closed
1231985.25.208.92 2049 udp nfs closed
1232087.247.240.207 21 tcp ftp open ProFTPD
1232187.247.240.207 22 tcp ssh open OpenSSH 7.4 protocol 2.0
1232287.247.240.207 67 udp dhcps unknown
1232387.247.240.207 68 udp dhcpc unknown
1232487.247.240.207 69 udp tftp unknown
1232587.247.240.207 80 tcp http open Apache httpd
1232687.247.240.207 88 udp kerberos-sec unknown
1232787.247.240.207 110 tcp pop3 open Dovecot pop3d
1232887.247.240.207 123 udp ntp unknown
1232987.247.240.207 139 udp netbios-ssn unknown
1233087.247.240.207 143 tcp imap open Dovecot imapd
1233187.247.240.207 161 udp snmp unknown
1233287.247.240.207 162 udp snmptrap unknown
1233387.247.240.207 389 udp ldap unknown
1233487.247.240.207 443 tcp ssl/http open Apache httpd
1233587.247.240.207 465 tcp ssl/smtp open Exim smtpd 4.92
1233687.247.240.207 520 udp route unknown
1233787.247.240.207 587 tcp smtp open Exim smtpd 4.92
1233887.247.240.207 993 tcp ssl/imaps open
1233987.247.240.207 995 tcp ssl/pop3s open
1234087.247.240.207 2049 udp nfs unknown
1234189.221.213.22 21 tcp ftp open vsftpd 3.0.2
1234289.221.213.22 53 tcp domain filtered
1234389.221.213.22 53 udp domain unknown
1234489.221.213.22 67 tcp dhcps filtered
1234589.221.213.22 67 udp dhcps unknown
1234689.221.213.22 68 tcp dhcpc filtered
1234789.221.213.22 68 udp dhcpc unknown
1234889.221.213.22 69 tcp tftp filtered
1234989.221.213.22 69 udp tftp unknown
1235089.221.213.22 88 tcp kerberos-sec filtered
1235189.221.213.22 88 udp kerberos-sec unknown
1235289.221.213.22 123 tcp ntp filtered
1235389.221.213.22 123 udp ntp unknown
1235489.221.213.22 137 tcp netbios-ns filtered
1235589.221.213.22 137 udp netbios-ns filtered
1235689.221.213.22 138 tcp netbios-dgm filtered
1235789.221.213.22 138 udp netbios-dgm filtered
1235889.221.213.22 139 tcp netbios-ssn closed
1235989.221.213.22 139 udp netbios-ssn unknown
1236089.221.213.22 161 tcp snmp filtered
1236189.221.213.22 161 udp snmp unknown
1236289.221.213.22 162 tcp snmptrap filtered
1236389.221.213.22 162 udp snmptrap unknown
1236489.221.213.22 389 tcp ldap filtered
1236589.221.213.22 389 udp ldap unknown
1236689.221.213.22 520 tcp efs filtered
1236789.221.213.22 520 udp route unknown
1236889.221.213.22 2049 tcp nfs filtered
1236989.221.213.22 2049 udp nfs unknown
1237089.248.172.200 22 tcp ssh open SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u3
1237189.248.172.200 53 tcp domain closed
1237289.248.172.200 53 udp domain closed
1237389.248.172.200 67 tcp dhcps closed
1237489.248.172.200 67 udp dhcps closed
1237589.248.172.200 68 tcp dhcpc closed
1237689.248.172.200 68 udp dhcpc closed
1237789.248.172.200 69 tcp tftp closed
1237889.248.172.200 69 udp tftp closed
1237989.248.172.200 88 tcp kerberos-sec closed
1238089.248.172.200 88 udp kerberos-sec unknown
1238189.248.172.200 123 tcp ntp closed
1238289.248.172.200 123 udp ntp unknown
1238389.248.172.200 137 tcp netbios-ns closed
1238489.248.172.200 137 udp netbios-ns filtered
1238589.248.172.200 138 tcp netbios-dgm closed
1238689.248.172.200 138 udp netbios-dgm filtered
1238789.248.172.200 139 tcp netbios-ssn closed
1238889.248.172.200 139 udp netbios-ssn closed
1238989.248.172.200 161 tcp snmp closed
1239089.248.172.200 161 udp snmp closed
1239189.248.172.200 162 tcp snmptrap closed
1239289.248.172.200 162 udp snmptrap unknown
1239389.248.172.200 389 tcp ldap closed
1239489.248.172.200 389 udp ldap closed
1239589.248.172.200 520 tcp efs closed
1239689.248.172.200 520 udp route closed
1239789.248.172.200 2049 tcp nfs closed
1239889.248.172.200 2049 udp nfs unknown
1239993.89.20.20 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 2 of 50 allowed.\x0d\x0a220-Local time is now 21:36. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
1240093.95.228.158 22 tcp ssh open SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
1240193.95.228.158 53 tcp domain closed
1240293.95.228.158 53 udp domain closed
1240393.95.228.158 67 tcp dhcps closed
1240493.95.228.158 67 udp dhcps closed
1240593.95.228.158 68 tcp dhcpc closed
1240693.95.228.158 68 udp dhcpc unknown
1240793.95.228.158 69 tcp tftp closed
1240893.95.228.158 69 udp tftp unknown
1240993.95.228.158 88 tcp kerberos-sec closed
1241093.95.228.158 88 udp kerberos-sec unknown
1241193.95.228.158 123 tcp ntp closed
1241293.95.228.158 123 udp ntp unknown
1241393.95.228.158 137 tcp netbios-ns closed
1241493.95.228.158 137 udp netbios-ns filtered
1241593.95.228.158 138 tcp netbios-dgm closed
1241693.95.228.158 138 udp netbios-dgm filtered
1241793.95.228.158 139 tcp netbios-ssn closed
1241893.95.228.158 139 udp netbios-ssn closed
1241993.95.228.158 161 tcp snmp closed
1242093.95.228.158 161 udp snmp unknown
1242193.95.228.158 162 tcp snmptrap closed
1242293.95.228.158 162 udp snmptrap unknown
1242393.95.228.158 389 tcp ldap closed
1242493.95.228.158 389 udp ldap closed
1242593.95.228.158 520 tcp efs closed
1242693.95.228.158 520 udp route unknown
1242793.95.228.158 2049 tcp nfs closed
1242893.95.228.158 2049 udp nfs unknown
1242993.113.37.250 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:36. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
1243093.113.37.250 53 tcp domain open PowerDNS Authoritative Server 4.1.10
1243193.113.37.250 53 udp domain open PowerDNS Authoritative Server 4.1.10
1243293.113.37.250 389 udp ldap unknown
1243393.113.37.250 520 udp route unknown
1243493.113.37.250 2049 udp nfs unknown
1243593.174.93.84 21 tcp ftp open vsftpd 3.0.2
1243693.174.93.84 25 tcp smtp closed
1243793.174.93.84 53 tcp domain filtered
1243893.174.93.84 53 udp domain filtered
1243993.174.93.84 67 tcp dhcps filtered
1244093.174.93.84 67 udp dhcps filtered
1244193.174.93.84 68 tcp dhcpc filtered
1244293.174.93.84 68 udp dhcpc unknown
1244393.174.93.84 69 tcp tftp filtered
1244493.174.93.84 69 udp tftp unknown
1244593.174.93.84 80 tcp http open Apache httpd 2.4.6 (CentOS) PHP/5.4.16
1244693.174.93.84 88 tcp kerberos-sec filtered
1244793.174.93.84 88 udp kerberos-sec unknown
1244893.174.93.84 123 tcp ntp filtered
1244993.174.93.84 123 udp ntp filtered
1245093.174.93.84 137 tcp netbios-ns filtered
1245193.174.93.84 137 udp netbios-ns filtered
1245293.174.93.84 138 tcp netbios-dgm filtered
1245393.174.93.84 138 udp netbios-dgm filtered
1245493.174.93.84 139 tcp netbios-ssn closed
1245593.174.93.84 139 udp netbios-ssn unknown
1245693.174.93.84 161 tcp snmp filtered
1245793.174.93.84 161 udp snmp unknown
1245893.174.93.84 162 tcp snmptrap filtered
1245993.174.93.84 162 udp snmptrap unknown
1246093.174.93.84 389 tcp ldap filtered
1246193.174.93.84 389 udp ldap filtered
1246293.174.93.84 445 tcp microsoft-ds closed
1246393.174.93.84 520 tcp efs filtered
1246493.174.93.84 520 udp route unknown
1246593.174.93.84 2049 tcp nfs filtered
1246693.174.93.84 2049 udp nfs unknown
1246793.191.156.197 22 tcp ssh open SSH-2.0-OpenSSH_5.3
1246894.102.51.33 22 tcp ssh open
1246994.102.51.33 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
1247094.102.51.33 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
1247194.102.51.33 67 tcp dhcps filtered
1247294.102.51.33 67 udp dhcps unknown
1247394.102.51.33 68 tcp dhcpc filtered
1247494.102.51.33 68 udp dhcpc unknown
1247594.102.51.33 69 tcp tftp filtered
1247694.102.51.33 69 udp tftp unknown
1247794.102.51.33 80 tcp http open nginx
1247894.102.51.33 88 tcp kerberos-sec filtered
1247994.102.51.33 88 udp kerberos-sec unknown
1248094.102.51.33 110 tcp pop3 open Dovecot pop3d
1248194.102.51.33 123 tcp ntp filtered
1248294.102.51.33 123 udp ntp unknown
1248394.102.51.33 137 tcp netbios-ns filtered
1248494.102.51.33 137 udp netbios-ns filtered
1248594.102.51.33 138 tcp netbios-dgm filtered
1248694.102.51.33 138 udp netbios-dgm filtered
1248794.102.51.33 139 tcp netbios-ssn closed
1248894.102.51.33 139 udp netbios-ssn unknown
1248994.102.51.33 143 tcp imap open Dovecot imapd
1249094.102.51.33 161 tcp snmp filtered
1249194.102.51.33 161 udp snmp unknown
1249294.102.51.33 162 tcp snmptrap filtered
1249394.102.51.33 162 udp snmptrap unknown
1249494.102.51.33 389 tcp ldap filtered
1249594.102.51.33 389 udp ldap unknown
1249694.102.51.33 465 tcp ssl/smtp open Exim smtpd 4.89
1249794.102.51.33 520 tcp efs filtered
1249894.102.51.33 520 udp route unknown
1249994.102.51.33 993 tcp ssl/imaps open
1250094.102.51.33 995 tcp ssl/pop3s open
1250194.102.51.33 2049 tcp nfs filtered
1250294.102.51.33 2049 udp nfs unknown
12503104.148.49.2 53 tcp domain closed
12504104.148.49.2 53 udp domain unknown
12505104.148.49.2 67 tcp dhcps closed
12506104.148.49.2 67 udp dhcps unknown
12507104.148.49.2 68 tcp dhcpc closed
12508104.148.49.2 68 udp dhcpc closed
12509104.148.49.2 69 tcp tftp closed
12510104.148.49.2 69 udp tftp unknown
12511104.148.49.2 88 tcp kerberos-sec closed
12512104.148.49.2 88 udp kerberos-sec unknown
12513104.148.49.2 123 tcp ntp closed
12514104.148.49.2 123 udp ntp unknown
12515104.148.49.2 137 tcp netbios-ns filtered
12516104.148.49.2 137 udp netbios-ns filtered
12517104.148.49.2 138 tcp netbios-dgm filtered
12518104.148.49.2 138 udp netbios-dgm filtered
12519104.148.49.2 139 tcp netbios-ssn closed
12520104.148.49.2 139 udp netbios-ssn closed
12521104.148.49.2 161 tcp snmp closed
12522104.148.49.2 161 udp snmp closed
12523104.148.49.2 162 tcp snmptrap closed
12524104.148.49.2 162 udp snmptrap unknown
12525104.148.49.2 389 tcp ldap closed
12526104.148.49.2 389 udp ldap closed
12527104.148.49.2 520 tcp efs closed
12528104.148.49.2 520 udp route unknown
12529104.148.49.2 2049 tcp nfs closed
12530104.148.49.2 2049 udp nfs closed
12531104.154.60.12 25 tcp smtp closed
12532104.154.60.12 53 tcp domain filtered
12533104.154.60.12 53 udp domain unknown
12534104.154.60.12 67 tcp dhcps filtered
12535104.154.60.12 67 udp dhcps unknown
12536104.154.60.12 68 tcp dhcpc filtered
12537104.154.60.12 68 udp dhcpc unknown
12538104.154.60.12 69 tcp tftp filtered
12539104.154.60.12 69 udp tftp unknown
12540104.154.60.12 80 tcp http open nginx
12541104.154.60.12 88 tcp kerberos-sec filtered
12542104.154.60.12 88 udp kerberos-sec unknown
12543104.154.60.12 123 tcp ntp filtered
12544104.154.60.12 123 udp ntp unknown
12545104.154.60.12 137 tcp netbios-ns filtered
12546104.154.60.12 137 udp netbios-ns filtered
12547104.154.60.12 138 tcp netbios-dgm filtered
12548104.154.60.12 138 udp netbios-dgm filtered
12549104.154.60.12 139 tcp netbios-ssn closed
12550104.154.60.12 139 udp netbios-ssn unknown
12551104.154.60.12 161 tcp snmp filtered
12552104.154.60.12 161 udp snmp unknown
12553104.154.60.12 162 tcp snmptrap filtered
12554104.154.60.12 162 udp snmptrap unknown
12555104.154.60.12 389 tcp ldap filtered
12556104.154.60.12 389 udp ldap unknown
12557104.154.60.12 443 tcp ssl/http open nginx
12558104.154.60.12 445 tcp microsoft-ds closed
12559104.154.60.12 520 tcp efs filtered
12560104.154.60.12 520 udp route unknown
12561104.154.60.12 2049 tcp nfs filtered
12562104.154.60.12 2049 udp nfs unknown
12563104.154.60.12 2222 tcp ssh open ProFTPD mod_sftp 0.9.9 protocol 2.0
12564104.218.232.66 22 tcp ssh open OpenSSH 7.4p1 Debian 10+deb9u3 protocol 2.0
12565104.218.232.66 53 tcp domain closed
12566104.218.232.66 53 udp domain unknown
12567104.218.232.66 67 tcp dhcps closed
12568104.218.232.66 67 udp dhcps unknown
12569104.218.232.66 68 tcp dhcpc closed
12570104.218.232.66 68 udp dhcpc closed
12571104.218.232.66 69 tcp tftp closed
12572104.218.232.66 69 udp tftp closed
12573104.218.232.66 80 tcp http open ngjit
12574104.218.232.66 88 tcp kerberos-sec closed
12575104.218.232.66 88 udp kerberos-sec closed
12576104.218.232.66 123 tcp ntp closed
12577104.218.232.66 123 udp ntp closed
12578104.218.232.66 137 tcp netbios-ns closed
12579104.218.232.66 137 udp netbios-ns filtered
12580104.218.232.66 138 tcp netbios-dgm closed
12581104.218.232.66 138 udp netbios-dgm filtered
12582104.218.232.66 139 tcp netbios-ssn closed
12583104.218.232.66 139 udp netbios-ssn closed
12584104.218.232.66 161 tcp snmp closed
12585104.218.232.66 161 udp snmp unknown
12586104.218.232.66 162 tcp snmptrap closed
12587104.218.232.66 162 udp snmptrap closed
12588104.218.232.66 389 tcp ldap closed
12589104.218.232.66 389 udp ldap closed
12590104.218.232.66 443 tcp ssl/https open ngjit
12591104.218.232.66 520 tcp efs closed
12592104.218.232.66 520 udp route unknown
12593104.218.232.66 2049 tcp nfs closed
12594104.218.232.66 2049 udp nfs closed
12595104.244.74.54 25 tcp smtp closed
12596104.244.74.54 53 tcp domain filtered
12597104.244.74.54 53 udp domain unknown
12598104.244.74.54 67 tcp dhcps filtered
12599104.244.74.54 67 udp dhcps unknown
12600104.244.74.54 68 tcp dhcpc filtered
12601104.244.74.54 68 udp dhcpc unknown
12602104.244.74.54 69 tcp tftp filtered
12603104.244.74.54 69 udp tftp unknown
12604104.244.74.54 80 tcp http open nginx
12605104.244.74.54 88 tcp kerberos-sec filtered
12606104.244.74.54 88 udp kerberos-sec unknown
12607104.244.74.54 123 tcp ntp filtered
12608104.244.74.54 123 udp ntp unknown
12609104.244.74.54 137 tcp netbios-ns filtered
12610104.244.74.54 137 udp netbios-ns filtered
12611104.244.74.54 138 tcp netbios-dgm filtered
12612104.244.74.54 138 udp netbios-dgm filtered
12613104.244.74.54 139 tcp netbios-ssn closed
12614104.244.74.54 139 udp netbios-ssn unknown
12615104.244.74.54 161 tcp snmp filtered
12616104.244.74.54 161 udp snmp unknown
12617104.244.74.54 162 tcp snmptrap filtered
12618104.244.74.54 162 udp snmptrap unknown
12619104.244.74.54 389 tcp ldap filtered
12620104.244.74.54 389 udp ldap unknown
12621104.244.74.54 443 tcp ssl/http open nginx
12622104.244.74.54 445 tcp microsoft-ds closed
12623104.244.74.54 520 tcp efs filtered
12624104.244.74.54 520 udp route unknown
12625104.244.74.54 2049 tcp nfs filtered
12626104.244.74.54 2049 udp nfs unknown
12627104.244.74.54 5040 tcp unknown closed
12628104.244.74.54 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
12629104.244.74.54 16221 tcp closed
12630104.244.74.54 23022 tcp closed
12631104.244.74.54 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
12632107.154.130.27 53 tcp domain open
12633107.154.130.27 53 udp domain open
12634107.154.130.27 67 tcp dhcps filtered
12635107.154.130.27 67 udp dhcps unknown
12636107.154.130.27 68 tcp dhcpc filtered
12637107.154.130.27 68 udp dhcpc unknown
12638107.154.130.27 69 tcp tftp filtered
12639107.154.130.27 69 udp tftp unknown
12640107.154.130.27 88 tcp http open Incapsula CDN httpd
12641107.154.130.27 88 udp kerberos-sec unknown
12642107.154.130.27 123 tcp ntp filtered
12643107.154.130.27 123 udp ntp unknown
12644107.154.130.27 137 tcp netbios-ns filtered
12645107.154.130.27 137 udp netbios-ns filtered
12646107.154.130.27 138 tcp netbios-dgm filtered
12647107.154.130.27 138 udp netbios-dgm filtered
12648107.154.130.27 139 tcp netbios-ssn closed
12649107.154.130.27 139 udp netbios-ssn unknown
12650107.154.130.27 161 tcp snmp filtered
12651107.154.130.27 161 udp snmp unknown
12652107.154.130.27 162 tcp snmptrap filtered
12653107.154.130.27 162 udp snmptrap unknown
12654107.154.130.27 389 tcp ssl/http open Incapsula CDN httpd
12655107.154.130.27 389 udp ldap unknown
12656107.154.130.27 520 tcp efs filtered
12657107.154.130.27 520 udp route unknown
12658107.154.130.27 2049 tcp http open Incapsula CDN httpd
12659107.154.130.27 2049 udp nfs unknown
12660107.154.248.27 53 tcp domain open
12661107.154.248.27 80 tcp http open Incapsula CDN httpd
12662107.154.248.27 81 tcp http open Incapsula CDN httpd
12663107.154.248.27 85 tcp http open Incapsula CDN httpd
12664107.154.248.27 88 tcp http open Incapsula CDN httpd
12665107.154.248.27 389 tcp ssl/http open Incapsula CDN httpd
12666107.154.248.27 443 tcp ssl/http open Incapsula CDN httpd
12667107.154.248.27 444 tcp ssl/http open Incapsula CDN httpd
12668107.154.248.27 446 tcp http open Incapsula CDN httpd
12669107.154.248.27 587 tcp http open Incapsula CDN httpd
12670107.154.248.27 631 tcp http open Incapsula CDN httpd
12671107.154.248.27 888 tcp http open Incapsula CDN httpd
12672107.154.248.27 995 tcp ssl/http open Incapsula CDN httpd
12673107.154.248.27 998 tcp ssl/http open Incapsula CDN httpd
12674107.154.248.27 999 tcp http open Incapsula CDN httpd
12675107.154.248.27 1000 tcp http open Incapsula CDN httpd
12676107.154.248.27 1024 tcp http open Incapsula CDN httpd
12677107.154.248.27 1103 tcp http open Incapsula CDN httpd
12678107.154.248.27 1234 tcp http open Incapsula CDN httpd
12679107.154.248.27 1433 tcp http open Incapsula CDN httpd
12680107.154.248.27 1494 tcp http open Incapsula CDN httpd
12681107.154.248.27 2000 tcp ssl/http open Incapsula CDN httpd
12682107.154.248.27 2001 tcp http open Incapsula CDN httpd
12683107.154.248.27 2049 tcp http open Incapsula CDN httpd
12684107.154.248.27 2067 tcp http open Incapsula CDN httpd
12685107.154.248.27 2100 tcp ssl/http open Incapsula CDN httpd
12686107.154.248.27 2222 tcp http open Incapsula CDN httpd
12687107.154.248.27 2598 tcp http open Incapsula CDN httpd
12688107.154.248.27 3000 tcp http open Incapsula CDN httpd
12689107.154.248.27 3050 tcp http open Incapsula CDN httpd
12690107.154.248.27 3057 tcp http open Incapsula CDN httpd
12691107.154.248.27 3299 tcp http open Incapsula CDN httpd
12692107.154.248.27 3306 tcp ssl/http open Incapsula CDN httpd
12693107.154.248.27 3333 tcp http open Incapsula CDN httpd
12694107.154.248.27 3389 tcp ssl/http open Incapsula CDN httpd
12695107.154.248.27 3500 tcp http open Incapsula CDN httpd
12696107.154.248.27 3790 tcp http open Incapsula CDN httpd
12697107.154.248.27 4000 tcp http open Incapsula CDN httpd
12698107.154.248.27 4444 tcp ssl/http open Incapsula CDN httpd
12699107.154.248.27 4445 tcp ssl/http open Incapsula CDN httpd
12700107.154.248.27 5000 tcp http open Incapsula CDN httpd
12701107.154.248.27 5009 tcp http open Incapsula CDN httpd
12702107.154.248.27 5060 tcp ssl/http open Incapsula CDN httpd
12703107.154.248.27 5061 tcp ssl/http open Incapsula CDN httpd
12704107.154.248.27 5227 tcp ssl/http open Incapsula CDN httpd
12705107.154.248.27 5247 tcp ssl/http open Incapsula CDN httpd
12706107.154.248.27 5250 tcp ssl/http open Incapsula CDN httpd
12707107.154.248.27 5555 tcp http open Incapsula CDN httpd
12708107.154.248.27 5900 tcp http open Incapsula CDN httpd
12709107.154.248.27 5901 tcp ssl/http open Incapsula CDN httpd
12710107.154.248.27 5902 tcp ssl/http open Incapsula CDN httpd
12711107.154.248.27 5903 tcp ssl/http open Incapsula CDN httpd
12712107.154.248.27 5904 tcp ssl/http open Incapsula CDN httpd
12713107.154.248.27 5905 tcp ssl/http open Incapsula CDN httpd
12714107.154.248.27 5906 tcp ssl/http open Incapsula CDN httpd
12715107.154.248.27 5907 tcp ssl/http open Incapsula CDN httpd
12716107.154.248.27 5908 tcp ssl/http open Incapsula CDN httpd
12717107.154.248.27 5909 tcp ssl/http open Incapsula CDN httpd
12718107.154.248.27 5910 tcp ssl/http open Incapsula CDN httpd
12719107.154.248.27 5920 tcp ssl/http open Incapsula CDN httpd
12720107.154.248.27 5984 tcp ssl/http open Incapsula CDN httpd
12721107.154.248.27 5985 tcp http open Incapsula CDN httpd
12722107.154.248.27 5986 tcp ssl/http open Incapsula CDN httpd
12723107.154.248.27 5999 tcp ssl/http open Incapsula CDN httpd
12724107.154.248.27 6000 tcp http open Incapsula CDN httpd
12725107.154.248.27 6060 tcp http open Incapsula CDN httpd
12726107.154.248.27 6161 tcp http open Incapsula CDN httpd
12727107.154.248.27 6379 tcp http open Incapsula CDN httpd
12728107.154.248.27 6661 tcp ssl/http open Incapsula CDN httpd
12729107.154.248.27 6789 tcp http open Incapsula CDN httpd
12730107.154.248.27 7000 tcp ssl/http open Incapsula CDN httpd
12731107.154.248.27 7001 tcp http open Incapsula CDN httpd
12732107.154.248.27 7021 tcp http open Incapsula CDN httpd
12733107.154.248.27 7071 tcp ssl/http open Incapsula CDN httpd
12734107.154.248.27 7080 tcp http open Incapsula CDN httpd
12735107.154.248.27 7272 tcp ssl/http open Incapsula CDN httpd
12736107.154.248.27 7443 tcp ssl/http open Incapsula CDN httpd
12737107.154.248.27 7700 tcp http open Incapsula CDN httpd
12738107.154.248.27 7777 tcp http open Incapsula CDN httpd
12739107.154.248.27 7778 tcp http open Incapsula CDN httpd
12740107.154.248.27 8000 tcp http open Incapsula CDN httpd
12741107.154.248.27 8001 tcp http open Incapsula CDN httpd
12742107.154.248.27 8008 tcp http open Incapsula CDN httpd
12743107.154.248.27 8014 tcp http open Incapsula CDN httpd
12744107.154.248.27 8020 tcp http open Incapsula CDN httpd
12745107.154.248.27 8023 tcp http open Incapsula CDN httpd
12746107.154.248.27 8028 tcp http open Incapsula CDN httpd
12747107.154.248.27 8030 tcp http open Incapsula CDN httpd
12748107.154.248.27 8050 tcp http open Incapsula CDN httpd
12749107.154.248.27 8051 tcp http open Incapsula CDN httpd
12750107.154.248.27 8080 tcp http open Incapsula CDN httpd
12751107.154.248.27 8081 tcp http open Incapsula CDN httpd
12752107.154.248.27 8082 tcp http open Incapsula CDN httpd
12753107.154.248.27 8085 tcp http open Incapsula CDN httpd
12754107.154.248.27 8086 tcp http open Incapsula CDN httpd
12755107.154.248.27 8087 tcp http open Incapsula CDN httpd
12756107.154.248.27 8088 tcp http open Incapsula CDN httpd
12757107.154.248.27 8090 tcp http open Incapsula CDN httpd
12758107.154.248.27 8091 tcp http open Incapsula CDN httpd
12759107.154.248.27 8095 tcp http open Incapsula CDN httpd
12760107.154.248.27 8101 tcp http open Incapsula CDN httpd
12761107.154.248.27 8161 tcp http open Incapsula CDN httpd
12762107.154.248.27 8180 tcp http open Incapsula CDN httpd
12763107.154.248.27 8222 tcp http open Incapsula CDN httpd
12764107.154.248.27 8333 tcp http open Incapsula CDN httpd
12765107.154.248.27 8443 tcp ssl/http open Incapsula CDN httpd
12766107.154.248.27 8444 tcp http open Incapsula CDN httpd
12767107.154.248.27 8445 tcp http open Incapsula CDN httpd
12768107.154.248.27 8503 tcp ssl/http open Incapsula CDN httpd
12769107.154.248.27 8686 tcp http open Incapsula CDN httpd
12770107.154.248.27 8787 tcp http open Incapsula CDN httpd
12771107.154.248.27 8800 tcp http open Incapsula CDN httpd
12772107.154.248.27 8812 tcp http open Incapsula CDN httpd
12773107.154.248.27 8834 tcp http open Incapsula CDN httpd
12774107.154.248.27 8880 tcp http open Incapsula CDN httpd
12775107.154.248.27 8888 tcp http open Incapsula CDN httpd
12776107.154.248.27 8889 tcp http open Incapsula CDN httpd
12777107.154.248.27 8890 tcp http open Incapsula CDN httpd
12778107.154.248.27 8899 tcp http open Incapsula CDN httpd
12779107.154.248.27 9000 tcp http open Incapsula CDN httpd
12780107.154.248.27 9001 tcp http open Incapsula CDN httpd
12781107.154.248.27 9002 tcp http open Incapsula CDN httpd
12782107.154.248.27 9003 tcp http open Incapsula CDN httpd
12783107.154.248.27 9004 tcp http open Incapsula CDN httpd
12784107.154.248.27 9005 tcp http open Incapsula CDN httpd
12785107.154.248.27 9010 tcp http open Incapsula CDN httpd
12786107.154.248.27 9050 tcp http open Incapsula CDN httpd
12787107.154.248.27 9080 tcp http open Incapsula CDN httpd
12788107.154.248.27 9081 tcp ssl/http open Incapsula CDN httpd
12789107.154.248.27 9084 tcp http open Incapsula CDN httpd
12790107.154.248.27 9090 tcp http open Incapsula CDN httpd
12791107.154.248.27 9099 tcp http open Incapsula CDN httpd
12792107.154.248.27 9100 tcp jetdirect open
12793107.154.248.27 9111 tcp http open Incapsula CDN httpd
12794107.154.248.27 9200 tcp http open Incapsula CDN httpd
12795107.154.248.27 9300 tcp http open Incapsula CDN httpd
12796107.154.248.27 9500 tcp http open Incapsula CDN httpd
12797107.154.248.27 9711 tcp ssl/http open Incapsula CDN httpd
12798107.154.248.27 9991 tcp http open Incapsula CDN httpd
12799107.154.248.27 9999 tcp http open Incapsula CDN httpd
12800107.154.248.27 10000 tcp http open Incapsula CDN httpd
12801107.154.248.27 10001 tcp http open Incapsula CDN httpd
12802107.154.248.27 10008 tcp http open Incapsula CDN httpd
12803107.154.248.27 10443 tcp ssl/http open Incapsula CDN httpd
12804107.154.248.27 11001 tcp ssl/http open Incapsula CDN httpd
12805107.154.248.27 12174 tcp http open Incapsula CDN httpd
12806107.154.248.27 12203 tcp http open Incapsula CDN httpd
12807107.154.248.27 12221 tcp http open Incapsula CDN httpd
12808107.154.248.27 12345 tcp http open Incapsula CDN httpd
12809107.154.248.27 12397 tcp http open Incapsula CDN httpd
12810107.154.248.27 12401 tcp http open Incapsula CDN httpd
12811107.154.248.27 14330 tcp http open Incapsula CDN httpd
12812107.154.248.27 16000 tcp http open Incapsula CDN httpd
12813107.154.248.27 20000 tcp http open Incapsula CDN httpd
12814107.154.248.27 20010 tcp ssl/http open Incapsula CDN httpd
12815107.154.248.27 25000 tcp ssl/http open Incapsula CDN httpd
12816107.154.248.27 30000 tcp http open Incapsula CDN httpd
12817107.154.248.27 44334 tcp ssl/http open Incapsula CDN httpd
12818107.154.248.27 50000 tcp http open Incapsula CDN httpd
12819107.154.248.27 50001 tcp ssl/http open Incapsula CDN httpd
12820107.154.248.27 50050 tcp ssl/http open Incapsula CDN httpd
12821141.105.65.111 25 tcp smtp closed
12822141.105.65.111 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
12823141.105.65.111 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
12824141.105.65.111 67 tcp dhcps filtered
12825141.105.65.111 67 udp dhcps unknown
12826141.105.65.111 68 tcp dhcpc filtered
12827141.105.65.111 68 udp dhcpc unknown
12828141.105.65.111 69 tcp tftp filtered
12829141.105.65.111 69 udp tftp unknown
12830141.105.65.111 88 tcp kerberos-sec filtered
12831141.105.65.111 88 udp kerberos-sec unknown
12832141.105.65.111 123 tcp ntp filtered
12833141.105.65.111 123 udp ntp unknown
12834141.105.65.111 137 tcp netbios-ns filtered
12835141.105.65.111 137 udp netbios-ns filtered
12836141.105.65.111 138 tcp netbios-dgm filtered
12837141.105.65.111 138 udp netbios-dgm filtered
12838141.105.65.111 139 tcp netbios-ssn closed
12839141.105.65.111 139 udp netbios-ssn unknown
12840141.105.65.111 161 tcp snmp filtered
12841141.105.65.111 161 udp snmp unknown
12842141.105.65.111 162 tcp snmptrap filtered
12843141.105.65.111 162 udp snmptrap unknown
12844141.105.65.111 389 tcp ldap filtered
12845141.105.65.111 389 udp ldap unknown
12846141.105.65.111 445 tcp microsoft-ds closed
12847141.105.65.111 520 tcp efs filtered
12848141.105.65.111 520 udp route unknown
12849141.105.65.111 2049 tcp nfs filtered
12850141.105.65.111 2049 udp nfs unknown
12851147.237.0.206 53 udp domain unknown
12852147.237.0.206 67 udp dhcps unknown
12853147.237.0.206 68 udp dhcpc unknown
12854147.237.0.206 69 udp tftp unknown
12855147.237.0.206 80 tcp http open
12856147.237.0.206 88 udp kerberos-sec unknown
12857147.237.0.206 123 udp ntp unknown
12858147.237.0.206 139 udp netbios-ssn unknown
12859147.237.0.206 161 udp snmp unknown
12860147.237.0.206 162 udp snmptrap unknown
12861147.237.0.206 389 udp ldap unknown
12862147.237.0.206 443 tcp ssl/https open
12863147.237.0.206 520 udp route unknown
12864147.237.0.206 2049 udp nfs unknown
12865150.95.250.133 25 tcp smtp closed
12866150.95.250.133 53 tcp domain filtered
12867150.95.250.133 53 udp domain unknown
12868150.95.250.133 67 tcp dhcps filtered
12869150.95.250.133 67 udp dhcps unknown
12870150.95.250.133 68 tcp dhcpc filtered
12871150.95.250.133 68 udp dhcpc unknown
12872150.95.250.133 69 tcp tftp filtered
12873150.95.250.133 69 udp tftp unknown
12874150.95.250.133 80 tcp http open nginx
12875150.95.250.133 88 tcp kerberos-sec filtered
12876150.95.250.133 88 udp kerberos-sec unknown
12877150.95.250.133 123 tcp ntp filtered
12878150.95.250.133 123 udp ntp unknown
12879150.95.250.133 137 tcp netbios-ns filtered
12880150.95.250.133 137 udp netbios-ns filtered
12881150.95.250.133 138 tcp netbios-dgm filtered
12882150.95.250.133 138 udp netbios-dgm filtered
12883150.95.250.133 139 tcp netbios-ssn closed
12884150.95.250.133 139 udp netbios-ssn unknown
12885150.95.250.133 161 tcp snmp filtered
12886150.95.250.133 161 udp snmp unknown
12887150.95.250.133 162 tcp snmptrap filtered
12888150.95.250.133 162 udp snmptrap unknown
12889150.95.250.133 389 tcp ldap filtered
12890150.95.250.133 389 udp ldap unknown
12891150.95.250.133 443 tcp ssl/http open nginx
12892150.95.250.133 445 tcp microsoft-ds closed
12893150.95.250.133 520 tcp efs filtered
12894150.95.250.133 520 udp route unknown
12895150.95.250.133 2049 tcp nfs filtered
12896150.95.250.133 2049 udp nfs unknown
12897151.139.243.11 25 tcp smtp closed
12898151.139.243.11 53 tcp domain filtered
12899151.139.243.11 53 udp domain unknown
12900151.139.243.11 67 tcp dhcps filtered
12901151.139.243.11 67 udp dhcps unknown
12902151.139.243.11 68 tcp dhcpc filtered
12903151.139.243.11 68 udp dhcpc unknown
12904151.139.243.11 69 tcp tftp filtered
12905151.139.243.11 69 udp tftp unknown
12906151.139.243.11 80 tcp http open Varnish
12907151.139.243.11 88 tcp kerberos-sec filtered
12908151.139.243.11 88 udp kerberos-sec unknown
12909151.139.243.11 123 tcp ntp filtered
12910151.139.243.11 123 udp ntp unknown
12911151.139.243.11 137 tcp netbios-ns filtered
12912151.139.243.11 137 udp netbios-ns filtered
12913151.139.243.11 138 tcp netbios-dgm filtered
12914151.139.243.11 138 udp netbios-dgm filtered
12915151.139.243.11 139 tcp netbios-ssn closed
12916151.139.243.11 139 udp netbios-ssn unknown
12917151.139.243.11 161 tcp snmp filtered
12918151.139.243.11 161 udp snmp unknown
12919151.139.243.11 162 tcp snmptrap filtered
12920151.139.243.11 162 udp snmptrap unknown
12921151.139.243.11 389 tcp ldap filtered
12922151.139.243.11 389 udp ldap unknown
12923151.139.243.11 443 tcp ssl/http open nginx
12924151.139.243.11 445 tcp microsoft-ds closed
12925151.139.243.11 520 tcp efs filtered
12926151.139.243.11 520 udp route unknown
12927151.139.243.11 2049 tcp nfs filtered
12928151.139.243.11 2049 udp nfs unknown
12929154.73.84.17 21 tcp ftp open 220 (vsFTPd 3.0.3)\x0d\x0a
12930157.7.107.254 25 tcp smtp closed
12931157.7.107.254 53 tcp domain filtered
12932157.7.107.254 53 udp domain unknown
12933157.7.107.254 67 tcp dhcps filtered
12934157.7.107.254 67 udp dhcps unknown
12935157.7.107.254 68 tcp dhcpc filtered
12936157.7.107.254 68 udp dhcpc filtered
12937157.7.107.254 69 tcp tftp filtered
12938157.7.107.254 69 udp tftp unknown
12939157.7.107.254 80 tcp http open Apache httpd
12940157.7.107.254 88 tcp kerberos-sec filtered
12941157.7.107.254 88 udp kerberos-sec unknown
12942157.7.107.254 123 tcp ntp filtered
12943157.7.107.254 123 udp ntp unknown
12944157.7.107.254 137 tcp netbios-ns filtered
12945157.7.107.254 137 udp netbios-ns filtered
12946157.7.107.254 138 tcp netbios-dgm filtered
12947157.7.107.254 138 udp netbios-dgm filtered
12948157.7.107.254 139 tcp netbios-ssn closed
12949157.7.107.254 139 udp netbios-ssn unknown
12950157.7.107.254 161 tcp snmp filtered
12951157.7.107.254 161 udp snmp unknown
12952157.7.107.254 162 tcp snmptrap filtered
12953157.7.107.254 162 udp snmptrap unknown
12954157.7.107.254 389 tcp ldap filtered
12955157.7.107.254 389 udp ldap filtered
12956157.7.107.254 443 tcp ssl/https open Apache
12957157.7.107.254 445 tcp microsoft-ds closed
12958157.7.107.254 520 tcp efs filtered
12959157.7.107.254 520 udp route unknown
12960157.7.107.254 2049 tcp nfs filtered
12961157.7.107.254 2049 udp nfs unknown
12962159.89.0.72 22 tcp ssh open SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.8
12963160.153.72.166 21 tcp ftp open Pure-FTPd
12964160.153.72.166 22 tcp ssh open OpenSSH 5.3 protocol 2.0
12965160.153.72.166 53 udp domain unknown
12966160.153.72.166 67 udp dhcps unknown
12967160.153.72.166 68 udp dhcpc unknown
12968160.153.72.166 69 udp tftp unknown
12969160.153.72.166 80 tcp http open Apache httpd
12970160.153.72.166 88 udp kerberos-sec unknown
12971160.153.72.166 110 tcp pop3 open Dovecot pop3d
12972160.153.72.166 123 udp ntp unknown
12973160.153.72.166 139 udp netbios-ssn unknown
12974160.153.72.166 143 tcp imap open Dovecot imapd
12975160.153.72.166 161 udp snmp unknown
12976160.153.72.166 162 udp snmptrap unknown
12977160.153.72.166 389 udp ldap unknown
12978160.153.72.166 443 tcp ssl/http open Apache httpd
12979160.153.72.166 465 tcp ssl/smtp open Exim smtpd 4.92
12980160.153.72.166 520 udp route unknown
12981160.153.72.166 587 tcp smtp open Exim smtpd 4.92
12982160.153.72.166 993 tcp ssl/imaps open
12983160.153.72.166 995 tcp ssl/pop3s open
12984160.153.72.166 2049 udp nfs unknown
12985160.153.72.166 3306 tcp mysql open MySQL 5.6.44-cll-lve
12986163.247.52.17 25 tcp smtp closed
12987163.247.52.17 53 tcp domain filtered
12988163.247.52.17 53 udp domain unknown
12989163.247.52.17 67 tcp dhcps filtered
12990163.247.52.17 67 udp dhcps unknown
12991163.247.52.17 68 tcp dhcpc filtered
12992163.247.52.17 68 udp dhcpc unknown
12993163.247.52.17 69 tcp tftp filtered
12994163.247.52.17 69 udp tftp unknown
12995163.247.52.17 80 tcp http open Apache httpd
12996163.247.52.17 88 tcp kerberos-sec filtered
12997163.247.52.17 88 udp kerberos-sec unknown
12998163.247.52.17 113 tcp ident closed
12999163.247.52.17 123 tcp ntp filtered
13000163.247.52.17 123 udp ntp unknown
13001163.247.52.17 137 tcp netbios-ns filtered
13002163.247.52.17 137 udp netbios-ns filtered
13003163.247.52.17 138 tcp netbios-dgm filtered
13004163.247.52.17 138 udp netbios-dgm filtered
13005163.247.52.17 139 tcp netbios-ssn closed
13006163.247.52.17 139 udp netbios-ssn unknown
13007163.247.52.17 161 tcp snmp filtered
13008163.247.52.17 161 udp snmp unknown
13009163.247.52.17 162 tcp snmptrap filtered
13010163.247.52.17 162 udp snmptrap unknown
13011163.247.52.17 389 tcp ldap filtered
13012163.247.52.17 389 udp ldap unknown
13013163.247.52.17 443 tcp ssl/https open
13014163.247.52.17 445 tcp microsoft-ds closed
13015163.247.52.17 520 tcp efs filtered
13016163.247.52.17 520 udp route unknown
13017163.247.52.17 2049 tcp nfs filtered
13018163.247.52.17 2049 udp nfs unknown
13019163.247.96.10 25 tcp smtp closed
13020163.247.96.10 53 tcp domain filtered
13021163.247.96.10 53 udp domain unknown
13022163.247.96.10 67 tcp dhcps filtered
13023163.247.96.10 67 udp dhcps unknown
13024163.247.96.10 68 tcp dhcpc filtered
13025163.247.96.10 68 udp dhcpc unknown
13026163.247.96.10 69 tcp tftp filtered
13027163.247.96.10 69 udp tftp unknown
13028163.247.96.10 80 tcp http open Apache httpd 2.2.22
13029163.247.96.10 88 tcp kerberos-sec filtered
13030163.247.96.10 88 udp kerberos-sec unknown
13031163.247.96.10 113 tcp ident closed
13032163.247.96.10 123 tcp ntp filtered
13033163.247.96.10 123 udp ntp unknown
13034163.247.96.10 137 tcp netbios-ns filtered
13035163.247.96.10 137 udp netbios-ns filtered
13036163.247.96.10 138 tcp netbios-dgm filtered
13037163.247.96.10 138 udp netbios-dgm filtered
13038163.247.96.10 139 tcp netbios-ssn closed
13039163.247.96.10 139 udp netbios-ssn unknown
13040163.247.96.10 161 tcp snmp filtered
13041163.247.96.10 161 udp snmp unknown
13042163.247.96.10 162 tcp snmptrap filtered
13043163.247.96.10 162 udp snmptrap unknown
13044163.247.96.10 389 tcp ldap filtered
13045163.247.96.10 389 udp ldap unknown
13046163.247.96.10 445 tcp microsoft-ds closed
13047163.247.96.10 465 tcp ssl/smtp open Exim smtpd 4.X
13048163.247.96.10 520 tcp efs filtered
13049163.247.96.10 520 udp route unknown
13050163.247.96.10 587 tcp smtp open Exim smtpd
13051163.247.96.10 2000 tcp cisco-sccp open
13052163.247.96.10 2049 tcp nfs filtered
13053163.247.96.10 2049 udp nfs unknown
13054163.247.96.10 4443 tcp http open Apache httpd
13055163.247.96.10 5060 tcp sip open
13056170.246.172.178 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 2 of 50 allowed.\x0d\x0a220-Local time is now 23:38. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
13057170.246.172.178 25 tcp smtp closed
13058170.246.172.178 53 tcp domain open PowerDNS Authoritative Server 4.1.10
13059170.246.172.178 53 udp domain open PowerDNS Authoritative Server 4.1.10
13060170.246.172.178 67 tcp dhcps filtered
13061170.246.172.178 67 udp dhcps unknown
13062170.246.172.178 68 tcp dhcpc filtered
13063170.246.172.178 68 udp dhcpc unknown
13064170.246.172.178 69 tcp tftp filtered
13065170.246.172.178 69 udp tftp unknown
13066170.246.172.178 88 tcp kerberos-sec filtered
13067170.246.172.178 88 udp kerberos-sec unknown
13068170.246.172.178 123 tcp ntp filtered
13069170.246.172.178 123 udp ntp unknown
13070170.246.172.178 137 tcp netbios-ns filtered
13071170.246.172.178 137 udp netbios-ns filtered
13072170.246.172.178 138 tcp netbios-dgm filtered
13073170.246.172.178 138 udp netbios-dgm filtered
13074170.246.172.178 139 tcp netbios-ssn closed
13075170.246.172.178 139 udp netbios-ssn unknown
13076170.246.172.178 161 tcp snmp filtered
13077170.246.172.178 161 udp snmp unknown
13078170.246.172.178 162 tcp snmptrap filtered
13079170.246.172.178 162 udp snmptrap unknown
13080170.246.172.178 389 tcp ldap filtered
13081170.246.172.178 389 udp ldap unknown
13082170.246.172.178 445 tcp microsoft-ds closed
13083170.246.172.178 520 tcp efs filtered
13084170.246.172.178 520 udp route unknown
13085170.246.172.178 2049 tcp nfs filtered
13086170.246.172.178 2049 udp nfs unknown
13087180.222.81.193 21 tcp ftp open ProFTPD or KnFTPD
13088180.222.81.193 25 tcp smtp closed
13089180.222.81.193 53 tcp domain filtered
13090180.222.81.193 53 udp domain unknown
13091180.222.81.193 67 tcp dhcps filtered
13092180.222.81.193 67 udp dhcps unknown
13093180.222.81.193 68 tcp dhcpc filtered
13094180.222.81.193 68 udp dhcpc unknown
13095180.222.81.193 69 tcp tftp filtered
13096180.222.81.193 69 udp tftp unknown
13097180.222.81.193 80 tcp http open Apache httpd PHP 5.2.8
13098180.222.81.193 88 tcp kerberos-sec filtered
13099180.222.81.193 88 udp kerberos-sec unknown
13100180.222.81.193 110 tcp pop3 open qmail pop3d
13101180.222.81.193 113 tcp ident closed
13102180.222.81.193 123 tcp ntp filtered
13103180.222.81.193 123 udp ntp unknown
13104180.222.81.193 137 tcp netbios-ns filtered
13105180.222.81.193 137 udp netbios-ns filtered
13106180.222.81.193 138 tcp netbios-dgm filtered
13107180.222.81.193 138 udp netbios-dgm filtered
13108180.222.81.193 139 tcp netbios-ssn closed
13109180.222.81.193 139 udp netbios-ssn unknown
13110180.222.81.193 143 tcp imap open Courier Imapd released 2005
13111180.222.81.193 161 tcp snmp filtered
13112180.222.81.193 161 udp snmp unknown
13113180.222.81.193 162 tcp snmptrap filtered
13114180.222.81.193 162 udp snmptrap unknown
13115180.222.81.193 389 tcp ldap filtered
13116180.222.81.193 389 udp ldap unknown
13117180.222.81.193 443 tcp ssl/http open Apache httpd PHP 5.2.8
13118180.222.81.193 445 tcp microsoft-ds closed
13119180.222.81.193 465 tcp ssl/smtps open
13120180.222.81.193 520 tcp efs filtered
13121180.222.81.193 520 udp route unknown
13122180.222.81.193 587 tcp smtp open Access Remote PC smtpd
13123180.222.81.193 993 tcp ssl/imaps open
13124180.222.81.193 995 tcp ssl/pop3s open
13125180.222.81.193 2049 tcp nfs filtered
13126180.222.81.193 2049 udp nfs unknown
13127180.222.81.193 8080 tcp ssl/http open Apache httpd
13128184.72.111.210 25 tcp smtp closed
13129184.72.111.210 53 tcp domain filtered
13130184.72.111.210 53 udp domain unknown
13131184.72.111.210 67 tcp dhcps filtered
13132184.72.111.210 67 udp dhcps unknown
13133184.72.111.210 68 tcp dhcpc filtered
13134184.72.111.210 68 udp dhcpc unknown
13135184.72.111.210 69 tcp tftp filtered
13136184.72.111.210 69 udp tftp unknown
13137184.72.111.210 80 tcp http open Microsoft HTTPAPI httpd 2.0 SSDP/UPnP
13138184.72.111.210 88 tcp kerberos-sec filtered
13139184.72.111.210 88 udp kerberos-sec unknown
13140184.72.111.210 123 tcp ntp filtered
13141184.72.111.210 123 udp ntp unknown
13142184.72.111.210 137 tcp netbios-ns filtered
13143184.72.111.210 137 udp netbios-ns filtered
13144184.72.111.210 138 tcp netbios-dgm filtered
13145184.72.111.210 138 udp netbios-dgm filtered
13146184.72.111.210 139 tcp netbios-ssn closed
13147184.72.111.210 139 udp netbios-ssn unknown
13148184.72.111.210 161 tcp snmp filtered
13149184.72.111.210 161 udp snmp unknown
13150184.72.111.210 162 tcp snmptrap filtered
13151184.72.111.210 162 udp snmptrap unknown
13152184.72.111.210 389 tcp ldap filtered
13153184.72.111.210 389 udp ldap unknown
13154184.72.111.210 443 tcp ssl/http open Microsoft HTTPAPI httpd 2.0 SSDP/UPnP
13155184.72.111.210 445 tcp microsoft-ds closed
13156184.72.111.210 520 tcp efs filtered
13157184.72.111.210 520 udp route unknown
13158184.72.111.210 2049 tcp nfs filtered
13159184.72.111.210 2049 udp nfs unknown
13160185.2.4.98 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 300 allowed.\x0d\x0a220-Local time is now 17:27. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 60 seconds of inactivity.\x0d\x0a
13161185.2.4.98 25 tcp smtp closed
13162185.2.4.98 53 tcp domain filtered
13163185.2.4.98 53 udp domain unknown
13164185.2.4.98 67 tcp dhcps filtered
13165185.2.4.98 67 udp dhcps unknown
13166185.2.4.98 68 tcp dhcpc filtered
13167185.2.4.98 68 udp dhcpc unknown
13168185.2.4.98 69 tcp tftp filtered
13169185.2.4.98 69 udp tftp unknown
13170185.2.4.98 88 tcp kerberos-sec filtered
13171185.2.4.98 88 udp kerberos-sec unknown
13172185.2.4.98 123 tcp ntp filtered
13173185.2.4.98 123 udp ntp unknown
13174185.2.4.98 137 tcp netbios-ns filtered
13175185.2.4.98 137 udp netbios-ns filtered
13176185.2.4.98 138 tcp netbios-dgm filtered
13177185.2.4.98 138 udp netbios-dgm filtered
13178185.2.4.98 139 tcp netbios-ssn closed
13179185.2.4.98 139 udp netbios-ssn unknown
13180185.2.4.98 161 tcp snmp filtered
13181185.2.4.98 161 udp snmp unknown
13182185.2.4.98 162 tcp snmptrap filtered
13183185.2.4.98 162 udp snmptrap unknown
13184185.2.4.98 389 tcp ldap filtered
13185185.2.4.98 389 udp ldap unknown
13186185.2.4.98 445 tcp microsoft-ds closed
13187185.2.4.98 520 tcp efs filtered
13188185.2.4.98 520 udp route unknown
13189185.2.4.98 2049 tcp nfs filtered
13190185.2.4.98 2049 udp nfs unknown
13191185.68.93.22 22 tcp ssh open SSH-2.0-OpenSSH_5.3
13192185.68.93.22 53 tcp domain closed
13193185.68.93.22 53 udp domain unknown
13194185.68.93.22 67 tcp dhcps closed
13195185.68.93.22 67 udp dhcps closed
13196185.68.93.22 68 tcp dhcpc closed
13197185.68.93.22 68 udp dhcpc closed
13198185.68.93.22 69 tcp tftp closed
13199185.68.93.22 69 udp tftp unknown
13200185.68.93.22 88 tcp kerberos-sec closed
13201185.68.93.22 88 udp kerberos-sec unknown
13202185.68.93.22 123 tcp ntp closed
13203185.68.93.22 123 udp ntp closed
13204185.68.93.22 137 tcp netbios-ns closed
13205185.68.93.22 137 udp netbios-ns filtered
13206185.68.93.22 138 tcp netbios-dgm closed
13207185.68.93.22 138 udp netbios-dgm filtered
13208185.68.93.22 139 tcp netbios-ssn closed
13209185.68.93.22 139 udp netbios-ssn closed
13210185.68.93.22 161 tcp snmp closed
13211185.68.93.22 161 udp snmp unknown
13212185.68.93.22 162 tcp snmptrap closed
13213185.68.93.22 162 udp snmptrap closed
13214185.68.93.22 389 tcp ldap closed
13215185.68.93.22 389 udp ldap unknown
13216185.68.93.22 520 tcp efs closed
13217185.68.93.22 520 udp route unknown
13218185.68.93.22 2049 tcp nfs closed
13219185.68.93.22 2049 udp nfs closed
13220185.119.173.237 25 tcp smtp closed
13221185.119.173.237 53 tcp domain filtered
13222185.119.173.237 53 udp domain unknown
13223185.119.173.237 67 tcp dhcps filtered
13224185.119.173.237 67 udp dhcps unknown
13225185.119.173.237 68 tcp dhcpc filtered
13226185.119.173.237 68 udp dhcpc unknown
13227185.119.173.237 69 tcp tftp filtered
13228185.119.173.237 69 udp tftp unknown
13229185.119.173.237 80 tcp http open Apache httpd
13230185.119.173.237 88 tcp kerberos-sec filtered
13231185.119.173.237 88 udp kerberos-sec unknown
13232185.119.173.237 123 tcp ntp filtered
13233185.119.173.237 123 udp ntp unknown
13234185.119.173.237 137 tcp netbios-ns filtered
13235185.119.173.237 137 udp netbios-ns filtered
13236185.119.173.237 138 tcp netbios-dgm filtered
13237185.119.173.237 138 udp netbios-dgm filtered
13238185.119.173.237 139 tcp netbios-ssn closed
13239185.119.173.237 139 udp netbios-ssn unknown
13240185.119.173.237 161 tcp snmp filtered
13241185.119.173.237 161 udp snmp unknown
13242185.119.173.237 162 tcp snmptrap filtered
13243185.119.173.237 162 udp snmptrap unknown
13244185.119.173.237 389 tcp ldap filtered
13245185.119.173.237 389 udp ldap unknown
13246185.119.173.237 443 tcp ssl/http open Apache httpd
13247185.119.173.237 445 tcp microsoft-ds closed
13248185.119.173.237 520 tcp efs filtered
13249185.119.173.237 520 udp route unknown
13250185.119.173.237 2049 tcp nfs filtered
13251185.119.173.237 2049 udp nfs unknown
13252186.67.91.110 25 tcp smtp closed
13253186.67.91.110 53 tcp domain filtered
13254186.67.91.110 53 udp domain unknown
13255186.67.91.110 67 tcp dhcps filtered
13256186.67.91.110 67 udp dhcps unknown
13257186.67.91.110 68 tcp dhcpc filtered
13258186.67.91.110 68 udp dhcpc unknown
13259186.67.91.110 69 tcp tftp filtered
13260186.67.91.110 69 udp tftp unknown
13261186.67.91.110 80 tcp http-proxy open F5 BIG-IP load balancer http proxy
13262186.67.91.110 88 tcp kerberos-sec filtered
13263186.67.91.110 88 udp kerberos-sec unknown
13264186.67.91.110 123 tcp ntp filtered
13265186.67.91.110 123 udp ntp unknown
13266186.67.91.110 137 tcp netbios-ns filtered
13267186.67.91.110 137 udp netbios-ns filtered
13268186.67.91.110 138 tcp netbios-dgm filtered
13269186.67.91.110 138 udp netbios-dgm filtered
13270186.67.91.110 139 tcp netbios-ssn closed
13271186.67.91.110 139 udp netbios-ssn unknown
13272186.67.91.110 161 tcp snmp filtered
13273186.67.91.110 161 udp snmp unknown
13274186.67.91.110 162 tcp snmptrap filtered
13275186.67.91.110 162 udp snmptrap unknown
13276186.67.91.110 389 tcp ldap filtered
13277186.67.91.110 389 udp ldap unknown
13278186.67.91.110 443 tcp ssl/https open
13279186.67.91.110 445 tcp microsoft-ds closed
13280186.67.91.110 520 tcp efs filtered
13281186.67.91.110 520 udp route unknown
13282186.67.91.110 2049 tcp nfs filtered
13283186.67.91.110 2049 udp nfs unknown
13284192.0.78.12 25 tcp smtp closed
13285192.0.78.12 53 tcp domain filtered
13286192.0.78.12 53 udp domain unknown
13287192.0.78.12 67 tcp dhcps filtered
13288192.0.78.12 67 udp dhcps unknown
13289192.0.78.12 68 tcp dhcpc filtered
13290192.0.78.12 68 udp dhcpc unknown
13291192.0.78.12 69 tcp tftp filtered
13292192.0.78.12 69 udp tftp unknown
13293192.0.78.12 80 tcp http open nginx
13294192.0.78.12 88 tcp kerberos-sec filtered
13295192.0.78.12 88 udp kerberos-sec unknown
13296192.0.78.12 123 tcp ntp filtered
13297192.0.78.12 123 udp ntp unknown
13298192.0.78.12 137 tcp netbios-ns filtered
13299192.0.78.12 137 udp netbios-ns filtered
13300192.0.78.12 138 tcp netbios-dgm filtered
13301192.0.78.12 138 udp netbios-dgm filtered
13302192.0.78.12 139 tcp netbios-ssn closed
13303192.0.78.12 139 udp netbios-ssn unknown
13304192.0.78.12 161 tcp snmp filtered
13305192.0.78.12 161 udp snmp unknown
13306192.0.78.12 162 tcp snmptrap filtered
13307192.0.78.12 162 udp snmptrap unknown
13308192.0.78.12 389 tcp ldap filtered
13309192.0.78.12 389 udp ldap unknown
13310192.0.78.12 443 tcp ssl/http open nginx
13311192.0.78.12 445 tcp microsoft-ds closed
13312192.0.78.12 520 tcp efs filtered
13313192.0.78.12 520 udp route unknown
13314192.0.78.12 2049 tcp nfs filtered
13315192.0.78.12 2049 udp nfs unknown
13316192.0.78.13 25 tcp smtp closed
13317192.0.78.13 53 tcp domain filtered
13318192.0.78.13 53 udp domain unknown
13319192.0.78.13 67 tcp dhcps filtered
13320192.0.78.13 67 udp dhcps unknown
13321192.0.78.13 68 tcp dhcpc filtered
13322192.0.78.13 68 udp dhcpc unknown
13323192.0.78.13 69 tcp tftp filtered
13324192.0.78.13 69 udp tftp unknown
13325192.0.78.13 80 tcp http open nginx
13326192.0.78.13 88 tcp kerberos-sec filtered
13327192.0.78.13 88 udp kerberos-sec unknown
13328192.0.78.13 123 tcp ntp filtered
13329192.0.78.13 123 udp ntp unknown
13330192.0.78.13 137 tcp netbios-ns filtered
13331192.0.78.13 137 udp netbios-ns filtered
13332192.0.78.13 138 tcp netbios-dgm filtered
13333192.0.78.13 138 udp netbios-dgm filtered
13334192.0.78.13 139 tcp netbios-ssn closed
13335192.0.78.13 139 udp netbios-ssn unknown
13336192.0.78.13 161 tcp snmp filtered
13337192.0.78.13 161 udp snmp unknown
13338192.0.78.13 162 tcp snmptrap filtered
13339192.0.78.13 162 udp snmptrap unknown
13340192.0.78.13 389 tcp ldap filtered
13341192.0.78.13 389 udp ldap unknown
13342192.0.78.13 443 tcp ssl/http open nginx
13343192.0.78.13 445 tcp microsoft-ds closed
13344192.0.78.13 520 tcp efs filtered
13345192.0.78.13 520 udp route unknown
13346192.0.78.13 2049 tcp nfs filtered
13347192.0.78.13 2049 udp nfs unknown
13348194.18.73.2 25 tcp smtp closed
13349194.18.73.2 53 tcp domain filtered
13350194.18.73.2 53 udp domain unknown
13351194.18.73.2 67 tcp dhcps filtered
13352194.18.73.2 67 udp dhcps unknown
13353194.18.73.2 68 tcp dhcpc filtered
13354194.18.73.2 68 udp dhcpc unknown
13355194.18.73.2 69 tcp tftp filtered
13356194.18.73.2 69 udp tftp unknown
13357194.18.73.2 80 tcp http-proxy open HAProxy http proxy 1.3.1 or later
13358194.18.73.2 88 tcp kerberos-sec filtered
13359194.18.73.2 88 udp kerberos-sec unknown
13360194.18.73.2 113 tcp ident closed
13361194.18.73.2 123 tcp ntp filtered
13362194.18.73.2 123 udp ntp unknown
13363194.18.73.2 137 tcp netbios-ns filtered
13364194.18.73.2 137 udp netbios-ns filtered
13365194.18.73.2 138 tcp netbios-dgm filtered
13366194.18.73.2 138 udp netbios-dgm filtered
13367194.18.73.2 139 tcp netbios-ssn closed
13368194.18.73.2 139 udp netbios-ssn unknown
13369194.18.73.2 161 tcp snmp filtered
13370194.18.73.2 161 udp snmp unknown
13371194.18.73.2 162 tcp snmptrap filtered
13372194.18.73.2 162 udp snmptrap unknown
13373194.18.73.2 389 tcp ldap filtered
13374194.18.73.2 389 udp ldap unknown
13375194.18.73.2 443 tcp ssl/http-proxy open HAProxy http proxy 1.3.1 or later
13376194.18.73.2 445 tcp microsoft-ds closed
13377194.18.73.2 520 tcp efs filtered
13378194.18.73.2 520 udp route closed
13379194.18.73.2 2049 tcp nfs filtered
13380194.18.73.2 2049 udp nfs unknown
13381194.39.164.140 21 tcp ftp open ProFTPD
13382194.39.164.140 53 tcp domain filtered
13383194.39.164.140 53 udp domain unknown
13384194.39.164.140 67 tcp dhcps filtered
13385194.39.164.140 67 udp dhcps unknown
13386194.39.164.140 68 tcp dhcpc filtered
13387194.39.164.140 68 udp dhcpc unknown
13388194.39.164.140 69 tcp tftp filtered
13389194.39.164.140 69 udp tftp unknown
13390194.39.164.140 80 tcp http open nginx
13391194.39.164.140 88 tcp kerberos-sec filtered
13392194.39.164.140 88 udp kerberos-sec unknown
13393194.39.164.140 110 tcp pop3 open Courier pop3d
13394194.39.164.140 123 tcp ntp filtered
13395194.39.164.140 123 udp ntp unknown
13396194.39.164.140 137 tcp netbios-ns filtered
13397194.39.164.140 137 udp netbios-ns filtered
13398194.39.164.140 138 tcp netbios-dgm filtered
13399194.39.164.140 138 udp netbios-dgm filtered
13400194.39.164.140 139 tcp netbios-ssn closed
13401194.39.164.140 139 udp netbios-ssn unknown
13402194.39.164.140 161 tcp snmp filtered
13403194.39.164.140 161 udp snmp unknown
13404194.39.164.140 162 tcp snmptrap filtered
13405194.39.164.140 162 udp snmptrap unknown
13406194.39.164.140 389 tcp ldap filtered
13407194.39.164.140 389 udp ldap unknown
13408194.39.164.140 443 tcp ssl/http open nginx
13409194.39.164.140 465 tcp ssl/smtps open
13410194.39.164.140 520 tcp efs filtered
13411194.39.164.140 520 udp route unknown
13412194.39.164.140 587 tcp smtp open Postfix smtpd
13413194.39.164.140 993 tcp ssl/imaps open
13414194.39.164.140 2020 tcp ssh open OpenSSH 7.4 protocol 2.0
13415194.39.164.140 2049 tcp nfs filtered
13416194.39.164.140 2049 udp nfs unknown
13417194.39.164.140 8443 tcp ssl/https-alt open sw-cp-server
13418194.39.164.140 8880 tcp http open sw-cp-server httpd Plesk Onyx 17.8.11
13419195.181.169.2 25 tcp smtp closed
13420195.181.169.2 53 tcp domain filtered
13421195.181.169.2 53 udp domain unknown
13422195.181.169.2 67 tcp dhcps filtered
13423195.181.169.2 67 udp dhcps unknown
13424195.181.169.2 68 tcp dhcpc filtered
13425195.181.169.2 68 udp dhcpc unknown
13426195.181.169.2 69 tcp tftp filtered
13427195.181.169.2 69 udp tftp unknown
13428195.181.169.2 80 tcp http open nginx reverse proxy
13429195.181.169.2 88 tcp kerberos-sec filtered
13430195.181.169.2 88 udp kerberos-sec unknown
13431195.181.169.2 123 tcp ntp filtered
13432195.181.169.2 123 udp ntp unknown
13433195.181.169.2 137 tcp netbios-ns filtered
13434195.181.169.2 137 udp netbios-ns filtered
13435195.181.169.2 138 tcp netbios-dgm filtered
13436195.181.169.2 138 udp netbios-dgm filtered
13437195.181.169.2 139 tcp netbios-ssn closed
13438195.181.169.2 139 udp netbios-ssn unknown
13439195.181.169.2 161 tcp snmp filtered
13440195.181.169.2 161 udp snmp unknown
13441195.181.169.2 162 tcp snmptrap filtered
13442195.181.169.2 162 udp snmptrap unknown
13443195.181.169.2 389 tcp ldap filtered
13444195.181.169.2 389 udp ldap unknown
13445195.181.169.2 443 tcp ssl/http open nginx reverse proxy
13446195.181.169.2 445 tcp microsoft-ds closed
13447195.181.169.2 520 tcp efs filtered
13448195.181.169.2 520 udp route unknown
13449195.181.169.2 2049 tcp nfs filtered
13450195.181.169.2 2049 udp nfs unknown
13451199.191.50.92 53 tcp tcpwrapped open
13452199.191.50.92 53 udp mdns open DNS-based service discovery
13453199.191.50.92 67 tcp dhcps filtered
13454199.191.50.92 67 udp dhcps unknown
13455199.191.50.92 68 tcp dhcpc filtered
13456199.191.50.92 68 udp dhcpc unknown
13457199.191.50.92 69 tcp tftp filtered
13458199.191.50.92 69 udp tftp unknown
13459199.191.50.92 88 tcp kerberos-sec filtered
13460199.191.50.92 88 udp kerberos-sec unknown
13461199.191.50.92 123 tcp ntp filtered
13462199.191.50.92 123 udp ntp unknown
13463199.191.50.92 137 tcp netbios-ns filtered
13464199.191.50.92 137 udp netbios-ns filtered
13465199.191.50.92 138 tcp netbios-dgm filtered
13466199.191.50.92 138 udp netbios-dgm filtered
13467199.191.50.92 139 tcp netbios-ssn closed
13468199.191.50.92 139 udp netbios-ssn unknown
13469199.191.50.92 161 tcp snmp filtered
13470199.191.50.92 161 udp snmp unknown
13471199.191.50.92 162 tcp snmptrap filtered
13472199.191.50.92 162 udp snmptrap unknown
13473199.191.50.92 389 tcp ldap filtered
13474199.191.50.92 389 udp ldap unknown
13475199.191.50.92 520 tcp efs filtered
13476199.191.50.92 520 udp route unknown
13477199.191.50.92 2049 tcp nfs filtered
13478199.191.50.92 2049 udp nfs unknown
13479200.14.67.43 25 tcp smtp closed
13480200.14.67.43 53 tcp domain filtered
13481200.14.67.43 53 udp domain unknown
13482200.14.67.43 67 tcp dhcps filtered
13483200.14.67.43 67 udp dhcps unknown
13484200.14.67.43 68 tcp dhcpc filtered
13485200.14.67.43 68 udp dhcpc unknown
13486200.14.67.43 69 tcp tftp filtered
13487200.14.67.43 69 udp tftp unknown
13488200.14.67.43 80 tcp http open nginx 1.16.1 Ubuntu
13489200.14.67.43 88 tcp kerberos-sec filtered
13490200.14.67.43 88 udp kerberos-sec unknown
13491200.14.67.43 123 tcp ntp filtered
13492200.14.67.43 123 udp ntp unknown
13493200.14.67.43 137 tcp netbios-ns filtered
13494200.14.67.43 137 udp netbios-ns filtered
13495200.14.67.43 138 tcp netbios-dgm filtered
13496200.14.67.43 138 udp netbios-dgm filtered
13497200.14.67.43 139 tcp netbios-ssn closed
13498200.14.67.43 139 udp netbios-ssn unknown
13499200.14.67.43 161 tcp snmp filtered
13500200.14.67.43 161 udp snmp unknown
13501200.14.67.43 162 tcp snmptrap filtered
13502200.14.67.43 162 udp snmptrap unknown
13503200.14.67.43 389 tcp ldap filtered
13504200.14.67.43 389 udp ldap unknown
13505200.14.67.43 443 tcp ssl/http open nginx 1.16.1 Ubuntu
13506200.14.67.43 445 tcp microsoft-ds closed
13507200.14.67.43 520 tcp efs filtered
13508200.14.67.43 520 udp route unknown
13509200.14.67.43 2049 tcp nfs filtered
13510200.14.67.43 2049 udp nfs unknown
13511200.14.67.65 25 tcp smtp closed
13512200.14.67.65 53 tcp domain filtered
13513200.14.67.65 53 udp domain unknown
13514200.14.67.65 67 tcp dhcps filtered
13515200.14.67.65 67 udp dhcps unknown
13516200.14.67.65 68 tcp dhcpc filtered
13517200.14.67.65 68 udp dhcpc unknown
13518200.14.67.65 69 tcp tftp filtered
13519200.14.67.65 69 udp tftp unknown
13520200.14.67.65 80 tcp http open nginx 1.16.1 Ubuntu
13521200.14.67.65 88 tcp kerberos-sec filtered
13522200.14.67.65 88 udp kerberos-sec unknown
13523200.14.67.65 123 tcp ntp filtered
13524200.14.67.65 123 udp ntp unknown
13525200.14.67.65 137 tcp netbios-ns filtered
13526200.14.67.65 137 udp netbios-ns filtered
13527200.14.67.65 138 tcp netbios-dgm filtered
13528200.14.67.65 138 udp netbios-dgm filtered
13529200.14.67.65 139 tcp netbios-ssn closed
13530200.14.67.65 139 udp netbios-ssn unknown
13531200.14.67.65 161 tcp snmp filtered
13532200.14.67.65 161 udp snmp unknown
13533200.14.67.65 162 tcp snmptrap filtered
13534200.14.67.65 162 udp snmptrap unknown
13535200.14.67.65 389 tcp ldap filtered
13536200.14.67.65 389 udp ldap unknown
13537200.14.67.65 443 tcp ssl/http open nginx 1.16.1 Ubuntu
13538200.14.67.65 445 tcp microsoft-ds closed
13539200.14.67.65 520 tcp efs filtered
13540200.14.67.65 520 udp route unknown
13541200.14.67.65 2049 tcp nfs filtered
13542200.14.67.65 2049 udp nfs unknown
13543200.35.157.77 53 tcp domain filtered
13544200.35.157.77 53 udp domain unknown
13545200.35.157.77 67 tcp dhcps filtered
13546200.35.157.77 67 udp dhcps unknown
13547200.35.157.77 68 tcp dhcpc filtered
13548200.35.157.77 68 udp dhcpc unknown
13549200.35.157.77 69 tcp tftp filtered
13550200.35.157.77 69 udp tftp unknown
13551200.35.157.77 88 tcp kerberos-sec filtered
13552200.35.157.77 88 udp kerberos-sec unknown
13553200.35.157.77 123 tcp ntp filtered
13554200.35.157.77 123 udp ntp unknown
13555200.35.157.77 137 tcp netbios-ns filtered
13556200.35.157.77 137 udp netbios-ns filtered
13557200.35.157.77 138 tcp netbios-dgm filtered
13558200.35.157.77 138 udp netbios-dgm filtered
13559200.35.157.77 139 tcp netbios-ssn closed
13560200.35.157.77 139 udp netbios-ssn unknown
13561200.35.157.77 161 tcp snmp filtered
13562200.35.157.77 161 udp snmp unknown
13563200.35.157.77 162 tcp snmptrap filtered
13564200.35.157.77 162 udp snmptrap unknown
13565200.35.157.77 389 tcp ldap filtered
13566200.35.157.77 389 udp ldap unknown
13567200.35.157.77 520 tcp efs filtered
13568200.35.157.77 520 udp route unknown
13569200.35.157.77 2049 tcp nfs filtered
13570200.35.157.77 2049 udp nfs unknown
13571201.131.38.40 25 tcp smtp closed
13572201.131.38.40 53 tcp domain filtered
13573201.131.38.40 53 udp domain unknown
13574201.131.38.40 67 tcp dhcps filtered
13575201.131.38.40 67 udp dhcps unknown
13576201.131.38.40 68 tcp dhcpc filtered
13577201.131.38.40 68 udp dhcpc unknown
13578201.131.38.40 69 tcp tftp filtered
13579201.131.38.40 69 udp tftp unknown
13580201.131.38.40 80 tcp http open Apache httpd
13581201.131.38.40 88 tcp kerberos-sec filtered
13582201.131.38.40 88 udp kerberos-sec unknown
13583201.131.38.40 123 tcp ntp filtered
13584201.131.38.40 123 udp ntp unknown
13585201.131.38.40 137 tcp netbios-ns filtered
13586201.131.38.40 137 udp netbios-ns filtered
13587201.131.38.40 138 tcp netbios-dgm filtered
13588201.131.38.40 138 udp netbios-dgm filtered
13589201.131.38.40 139 tcp netbios-ssn closed
13590201.131.38.40 139 udp netbios-ssn unknown
13591201.131.38.40 161 tcp snmp filtered
13592201.131.38.40 161 udp snmp unknown
13593201.131.38.40 162 tcp snmptrap filtered
13594201.131.38.40 162 udp snmptrap unknown
13595201.131.38.40 389 tcp ldap filtered
13596201.131.38.40 389 udp ldap unknown
13597201.131.38.40 443 tcp ssl/http open Apache httpd
13598201.131.38.40 445 tcp microsoft-ds closed
13599201.131.38.40 520 tcp efs filtered
13600201.131.38.40 520 udp route unknown
13601201.131.38.40 2049 tcp nfs filtered
13602201.131.38.40 2049 udp nfs unknown
13603201.238.246.43 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 05:39. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
13604201.238.246.43 25 tcp smtp closed
13605201.238.246.43 53 tcp domain filtered
13606201.238.246.43 53 udp domain unknown
13607201.238.246.43 67 tcp dhcps filtered
13608201.238.246.43 67 udp dhcps unknown
13609201.238.246.43 68 tcp dhcpc filtered
13610201.238.246.43 68 udp dhcpc unknown
13611201.238.246.43 69 tcp tftp filtered
13612201.238.246.43 69 udp tftp unknown
13613201.238.246.43 88 tcp kerberos-sec filtered
13614201.238.246.43 88 udp kerberos-sec unknown
13615201.238.246.43 113 tcp ident closed
13616201.238.246.43 123 tcp ntp filtered
13617201.238.246.43 123 udp ntp unknown
13618201.238.246.43 137 tcp netbios-ns filtered
13619201.238.246.43 137 udp netbios-ns filtered
13620201.238.246.43 138 tcp netbios-dgm filtered
13621201.238.246.43 138 udp netbios-dgm filtered
13622201.238.246.43 139 tcp netbios-ssn closed
13623201.238.246.43 139 udp netbios-ssn unknown
13624201.238.246.43 161 tcp snmp filtered
13625201.238.246.43 161 udp snmp unknown
13626201.238.246.43 162 tcp snmptrap filtered
13627201.238.246.43 162 udp snmptrap unknown
13628201.238.246.43 389 tcp ldap filtered
13629201.238.246.43 389 udp ldap unknown
13630201.238.246.43 445 tcp microsoft-ds closed
13631201.238.246.43 520 tcp efs filtered
13632201.238.246.43 520 udp route unknown
13633201.238.246.43 2049 tcp nfs filtered
13634201.238.246.43 2049 udp nfs unknown
13635202.214.194.138 25 tcp smtp closed
13636202.214.194.138 53 tcp domain filtered
13637202.214.194.138 53 udp domain unknown
13638202.214.194.138 67 tcp dhcps filtered
13639202.214.194.138 67 udp dhcps unknown
13640202.214.194.138 68 tcp dhcpc filtered
13641202.214.194.138 68 udp dhcpc unknown
13642202.214.194.138 69 tcp tftp filtered
13643202.214.194.138 69 udp tftp unknown
13644202.214.194.138 80 tcp http open
13645202.214.194.138 88 tcp kerberos-sec filtered
13646202.214.194.138 88 udp kerberos-sec unknown
13647202.214.194.138 123 tcp ntp filtered
13648202.214.194.138 123 udp ntp unknown
13649202.214.194.138 137 tcp netbios-ns filtered
13650202.214.194.138 137 udp netbios-ns filtered
13651202.214.194.138 138 tcp netbios-dgm filtered
13652202.214.194.138 138 udp netbios-dgm filtered
13653202.214.194.138 139 tcp netbios-ssn closed
13654202.214.194.138 139 udp netbios-ssn unknown
13655202.214.194.138 161 tcp snmp filtered
13656202.214.194.138 161 udp snmp unknown
13657202.214.194.138 162 tcp snmptrap filtered
13658202.214.194.138 162 udp snmptrap unknown
13659202.214.194.138 389 tcp ldap filtered
13660202.214.194.138 389 udp ldap unknown
13661202.214.194.138 443 tcp ssl/https open
13662202.214.194.138 445 tcp microsoft-ds closed
13663202.214.194.138 520 tcp efs filtered
13664202.214.194.138 520 udp route unknown
13665202.214.194.138 2049 tcp nfs filtered
13666202.214.194.138 2049 udp nfs unknown
13667202.238.130.103 25 tcp smtp closed
13668202.238.130.103 53 tcp domain filtered
13669202.238.130.103 53 udp domain unknown
13670202.238.130.103 67 tcp dhcps filtered
13671202.238.130.103 67 udp dhcps unknown
13672202.238.130.103 68 tcp dhcpc filtered
13673202.238.130.103 68 udp dhcpc unknown
13674202.238.130.103 69 tcp tftp filtered
13675202.238.130.103 69 udp tftp unknown
13676202.238.130.103 80 tcp http-proxy open F5 BIG-IP load balancer http proxy
13677202.238.130.103 88 tcp kerberos-sec filtered
13678202.238.130.103 88 udp kerberos-sec unknown
13679202.238.130.103 113 tcp ident closed
13680202.238.130.103 123 tcp ntp filtered
13681202.238.130.103 123 udp ntp unknown
13682202.238.130.103 137 tcp netbios-ns filtered
13683202.238.130.103 137 udp netbios-ns filtered
13684202.238.130.103 138 tcp netbios-dgm filtered
13685202.238.130.103 138 udp netbios-dgm filtered
13686202.238.130.103 139 tcp netbios-ssn closed
13687202.238.130.103 139 udp netbios-ssn unknown
13688202.238.130.103 161 tcp snmp filtered
13689202.238.130.103 161 udp snmp unknown
13690202.238.130.103 162 tcp snmptrap filtered
13691202.238.130.103 162 udp snmptrap unknown
13692202.238.130.103 389 tcp ldap filtered
13693202.238.130.103 389 udp ldap unknown
13694202.238.130.103 443 tcp ssl/http open Apache httpd
13695202.238.130.103 445 tcp microsoft-ds closed
13696202.238.130.103 520 tcp efs filtered
13697202.238.130.103 520 udp route unknown
13698202.238.130.103 2049 tcp nfs filtered
13699202.238.130.103 2049 udp nfs unknown
13700202.238.130.103 8008 tcp http open
13701203.137.110.66 21 tcp ftp open 220 203.137.110.66 FTP server ready\x0d\x0a
13702203.180.216.224 25 tcp smtp closed
13703203.180.216.224 53 tcp domain filtered
13704203.180.216.224 53 udp domain unknown
13705203.180.216.224 67 tcp dhcps filtered
13706203.180.216.224 67 udp dhcps unknown
13707203.180.216.224 68 tcp dhcpc filtered
13708203.180.216.224 68 udp dhcpc unknown
13709203.180.216.224 69 tcp tftp filtered
13710203.180.216.224 69 udp tftp unknown
13711203.180.216.224 80 tcp http open nginx
13712203.180.216.224 88 tcp kerberos-sec filtered
13713203.180.216.224 88 udp kerberos-sec unknown
13714203.180.216.224 123 tcp ntp filtered
13715203.180.216.224 123 udp ntp unknown
13716203.180.216.224 137 tcp netbios-ns filtered
13717203.180.216.224 137 udp netbios-ns filtered
13718203.180.216.224 138 tcp netbios-dgm filtered
13719203.180.216.224 138 udp netbios-dgm filtered
13720203.180.216.224 139 tcp netbios-ssn closed
13721203.180.216.224 139 udp netbios-ssn unknown
13722203.180.216.224 161 tcp snmp filtered
13723203.180.216.224 161 udp snmp unknown
13724203.180.216.224 162 tcp snmptrap filtered
13725203.180.216.224 162 udp snmptrap unknown
13726203.180.216.224 389 tcp ldap filtered
13727203.180.216.224 389 udp ldap unknown
13728203.180.216.224 443 tcp ssl/http open nginx
13729203.180.216.224 445 tcp microsoft-ds closed
13730203.180.216.224 520 tcp efs filtered
13731203.180.216.224 520 udp route unknown
13732203.180.216.224 2049 tcp nfs filtered
13733203.180.216.224 2049 udp nfs unknown
13734203.183.218.244 21 tcp ftp open 220 203.183.218.130 FTP server ready\x0d\x0a
13735205.134.171.80 22 tcp ssh open SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.8
13736205.134.171.80 53 tcp domain filtered
13737205.134.171.80 53 udp domain unknown
13738205.134.171.80 67 tcp dhcps filtered
13739205.134.171.80 67 udp dhcps unknown
13740205.134.171.80 68 tcp dhcpc filtered
13741205.134.171.80 68 udp dhcpc unknown
13742205.134.171.80 69 tcp tftp filtered
13743205.134.171.80 69 udp tftp unknown
13744205.134.171.80 88 tcp kerberos-sec filtered
13745205.134.171.80 88 udp kerberos-sec unknown
13746205.134.171.80 123 tcp ntp filtered
13747205.134.171.80 123 udp ntp unknown
13748205.134.171.80 137 tcp netbios-ns filtered
13749205.134.171.80 137 udp netbios-ns filtered
13750205.134.171.80 138 tcp netbios-dgm filtered
13751205.134.171.80 138 udp netbios-dgm filtered
13752205.134.171.80 139 tcp netbios-ssn closed
13753205.134.171.80 139 udp netbios-ssn unknown
13754205.134.171.80 161 tcp snmp filtered
13755205.134.171.80 161 udp snmp unknown
13756205.134.171.80 162 tcp snmptrap filtered
13757205.134.171.80 162 udp snmptrap unknown
13758205.134.171.80 389 tcp ldap filtered
13759205.134.171.80 389 udp ldap unknown
13760205.134.171.80 520 tcp efs filtered
13761205.134.171.80 520 udp route unknown
13762205.134.171.80 2049 tcp nfs filtered
13763205.134.171.80 2049 udp nfs unknown
13764208.113.216.185 25 tcp smtp closed
13765208.113.216.185 53 tcp domain filtered
13766208.113.216.185 53 udp domain unknown
13767208.113.216.185 67 tcp dhcps filtered
13768208.113.216.185 67 udp dhcps unknown
13769208.113.216.185 68 tcp dhcpc filtered
13770208.113.216.185 68 udp dhcpc unknown
13771208.113.216.185 69 tcp tftp filtered
13772208.113.216.185 69 udp tftp unknown
13773208.113.216.185 88 tcp kerberos-sec filtered
13774208.113.216.185 88 udp kerberos-sec unknown
13775208.113.216.185 123 tcp ntp filtered
13776208.113.216.185 123 udp ntp unknown
13777208.113.216.185 137 tcp netbios-ns filtered
13778208.113.216.185 137 udp netbios-ns filtered
13779208.113.216.185 138 tcp netbios-dgm filtered
13780208.113.216.185 138 udp netbios-dgm filtered
13781208.113.216.185 139 tcp netbios-ssn closed
13782208.113.216.185 139 udp netbios-ssn unknown
13783208.113.216.185 161 tcp snmp filtered
13784208.113.216.185 161 udp snmp unknown
13785208.113.216.185 162 tcp snmptrap filtered
13786208.113.216.185 162 udp snmptrap unknown
13787208.113.216.185 389 tcp ldap filtered
13788208.113.216.185 389 udp ldap unknown
13789208.113.216.185 445 tcp microsoft-ds closed
13790208.113.216.185 520 tcp efs filtered
13791208.113.216.185 520 udp route unknown
13792208.113.216.185 2049 tcp nfs filtered
13793208.113.216.185 2049 udp nfs unknown
13794208.113.220.218 25 tcp smtp closed
13795208.113.220.218 53 tcp domain filtered
13796208.113.220.218 53 udp domain unknown
13797208.113.220.218 67 tcp dhcps filtered
13798208.113.220.218 67 udp dhcps unknown
13799208.113.220.218 68 tcp dhcpc filtered
13800208.113.220.218 68 udp dhcpc unknown
13801208.113.220.218 69 tcp tftp filtered
13802208.113.220.218 69 udp tftp unknown
13803208.113.220.218 88 tcp kerberos-sec filtered
13804208.113.220.218 88 udp kerberos-sec unknown
13805208.113.220.218 123 tcp ntp filtered
13806208.113.220.218 123 udp ntp unknown
13807208.113.220.218 137 tcp netbios-ns filtered
13808208.113.220.218 137 udp netbios-ns filtered
13809208.113.220.218 138 tcp netbios-dgm filtered
13810208.113.220.218 138 udp netbios-dgm filtered
13811208.113.220.218 139 tcp netbios-ssn closed
13812208.113.220.218 139 udp netbios-ssn unknown
13813208.113.220.218 161 tcp snmp filtered
13814208.113.220.218 161 udp snmp unknown
13815208.113.220.218 162 tcp snmptrap filtered
13816208.113.220.218 162 udp snmptrap unknown
13817208.113.220.218 389 tcp ldap filtered
13818208.113.220.218 389 udp ldap unknown
13819208.113.220.218 445 tcp microsoft-ds closed
13820208.113.220.218 520 tcp efs filtered
13821208.113.220.218 520 udp route unknown
13822208.113.220.218 2049 tcp nfs filtered
13823208.113.220.218 2049 udp nfs unknown
13824209.59.165.178 25 tcp smtp closed
13825209.59.165.178 53 tcp domain filtered PowerDNS Authoritative Server 4.1.10
13826209.59.165.178 53 udp domain unknown PowerDNS Authoritative Server 4.1.10
13827209.59.165.178 67 tcp dhcps filtered
13828209.59.165.178 67 udp dhcps unknown
13829209.59.165.178 68 tcp dhcpc filtered
13830209.59.165.178 68 udp dhcpc unknown
13831209.59.165.178 69 tcp tftp filtered
13832209.59.165.178 69 udp tftp unknown
13833209.59.165.178 88 tcp kerberos-sec filtered
13834209.59.165.178 88 udp kerberos-sec unknown
13835209.59.165.178 123 tcp ntp filtered
13836209.59.165.178 123 udp ntp unknown
13837209.59.165.178 137 tcp netbios-ns filtered
13838209.59.165.178 137 udp netbios-ns filtered
13839209.59.165.178 138 tcp netbios-dgm filtered
13840209.59.165.178 138 udp netbios-dgm filtered
13841209.59.165.178 139 tcp netbios-ssn closed
13842209.59.165.178 139 udp netbios-ssn unknown
13843209.59.165.178 161 tcp snmp filtered
13844209.59.165.178 161 udp snmp unknown
13845209.59.165.178 162 tcp snmptrap filtered
13846209.59.165.178 162 udp snmptrap unknown
13847209.59.165.178 389 tcp ldap filtered
13848209.59.165.178 389 udp ldap unknown
13849209.59.165.178 445 tcp microsoft-ds closed
13850209.59.165.178 520 tcp efs filtered
13851209.59.165.178 520 udp route unknown
13852209.59.165.178 2049 tcp nfs filtered
13853209.59.165.178 2049 udp nfs unknown
13854210.149.141.34 53 tcp domain filtered
13855210.149.141.34 53 udp domain unknown
13856210.149.141.34 67 tcp dhcps filtered
13857210.149.141.34 67 udp dhcps unknown
13858210.149.141.34 68 tcp dhcpc filtered
13859210.149.141.34 68 udp dhcpc unknown
13860210.149.141.34 69 tcp tftp filtered
13861210.149.141.34 69 udp tftp unknown
13862210.149.141.34 88 tcp kerberos-sec filtered
13863210.149.141.34 88 udp kerberos-sec unknown
13864210.149.141.34 123 tcp ntp filtered
13865210.149.141.34 123 udp ntp unknown
13866210.149.141.34 137 tcp netbios-ns filtered
13867210.149.141.34 137 udp netbios-ns filtered
13868210.149.141.34 138 tcp netbios-dgm filtered
13869210.149.141.34 138 udp netbios-dgm filtered
13870210.149.141.34 139 tcp netbios-ssn closed
13871210.149.141.34 139 udp netbios-ssn unknown
13872210.149.141.34 161 tcp snmp filtered
13873210.149.141.34 161 udp snmp unknown
13874210.149.141.34 162 tcp snmptrap filtered
13875210.149.141.34 162 udp snmptrap unknown
13876210.149.141.34 389 tcp ldap filtered
13877210.149.141.34 389 udp ldap unknown
13878210.149.141.34 520 tcp efs filtered
13879210.149.141.34 520 udp route unknown
13880210.149.141.34 2049 tcp nfs filtered
13881210.149.141.34 2049 udp nfs unknown
13882210.152.243.182 21 tcp ftp open 220 (vsFTPd 2.2.2)\x0d\x0a
13883210.160.220.105 53 tcp domain closed
13884210.160.220.105 53 udp domain unknown
13885210.160.220.105 67 tcp dhcps closed
13886210.160.220.105 67 udp dhcps unknown
13887210.160.220.105 68 tcp dhcpc closed
13888210.160.220.105 68 udp dhcpc unknown
13889210.160.220.105 69 tcp tftp filtered
13890210.160.220.105 69 udp tftp unknown
13891210.160.220.105 88 tcp kerberos-sec closed
13892210.160.220.105 88 udp kerberos-sec unknown
13893210.160.220.105 123 tcp ntp filtered
13894210.160.220.105 123 udp ntp unknown
13895210.160.220.105 137 tcp netbios-ns closed
13896210.160.220.105 137 udp netbios-ns filtered
13897210.160.220.105 138 tcp netbios-dgm closed
13898210.160.220.105 138 udp netbios-dgm filtered
13899210.160.220.105 139 tcp netbios-ssn closed
13900210.160.220.105 139 udp netbios-ssn unknown
13901210.160.220.105 161 tcp snmp closed
13902210.160.220.105 161 udp snmp unknown
13903210.160.220.105 162 tcp snmptrap filtered
13904210.160.220.105 162 udp snmptrap unknown
13905210.160.220.105 389 tcp ldap closed
13906210.160.220.105 389 udp ldap unknown
13907210.160.220.105 520 tcp efs closed
13908210.160.220.105 520 udp route unknown
13909210.160.220.105 2049 tcp nfs closed
13910210.160.220.105 2049 udp nfs unknown
13911210.160.220.113 53 tcp domain closed
13912210.160.220.113 53 udp domain unknown
13913210.160.220.113 67 tcp dhcps closed
13914210.160.220.113 67 udp dhcps unknown
13915210.160.220.113 68 tcp dhcpc closed
13916210.160.220.113 68 udp dhcpc unknown
13917210.160.220.113 69 tcp tftp closed
13918210.160.220.113 69 udp tftp unknown
13919210.160.220.113 88 tcp kerberos-sec filtered
13920210.160.220.113 88 udp kerberos-sec unknown
13921210.160.220.113 123 tcp ntp filtered
13922210.160.220.113 123 udp ntp unknown
13923210.160.220.113 137 tcp netbios-ns closed
13924210.160.220.113 137 udp netbios-ns filtered
13925210.160.220.113 138 tcp netbios-dgm closed
13926210.160.220.113 138 udp netbios-dgm filtered
13927210.160.220.113 139 tcp netbios-ssn closed
13928210.160.220.113 139 udp netbios-ssn unknown
13929210.160.220.113 161 tcp snmp closed
13930210.160.220.113 161 udp snmp unknown
13931210.160.220.113 162 tcp snmptrap closed
13932210.160.220.113 162 udp snmptrap unknown
13933210.160.220.113 389 tcp ldap filtered
13934210.160.220.113 389 udp ldap unknown
13935210.160.220.113 520 tcp efs closed
13936210.160.220.113 520 udp route unknown
13937210.160.220.113 2049 tcp nfs closed
13938210.160.220.113 2049 udp nfs unknown
13939210.226.36.2 25 tcp smtp closed
13940210.226.36.2 53 tcp domain filtered
13941210.226.36.2 53 udp domain unknown
13942210.226.36.2 67 tcp dhcps filtered
13943210.226.36.2 67 udp dhcps unknown
13944210.226.36.2 68 tcp dhcpc filtered
13945210.226.36.2 68 udp dhcpc unknown
13946210.226.36.2 69 tcp tftp filtered
13947210.226.36.2 69 udp tftp unknown
13948210.226.36.2 80 tcp http open Apache httpd 1.3.41 (Unix) PHP/3.0.18-i18n-ja-3
13949210.226.36.2 88 tcp kerberos-sec filtered
13950210.226.36.2 88 udp kerberos-sec unknown
13951210.226.36.2 123 tcp ntp filtered
13952210.226.36.2 123 udp ntp unknown
13953210.226.36.2 137 tcp netbios-ns filtered
13954210.226.36.2 137 udp netbios-ns filtered
13955210.226.36.2 138 tcp netbios-dgm filtered
13956210.226.36.2 138 udp netbios-dgm filtered
13957210.226.36.2 139 tcp netbios-ssn closed
13958210.226.36.2 139 udp netbios-ssn unknown
13959210.226.36.2 161 tcp snmp filtered
13960210.226.36.2 161 udp snmp unknown
13961210.226.36.2 162 tcp snmptrap filtered
13962210.226.36.2 162 udp snmptrap unknown
13963210.226.36.2 389 tcp ldap filtered
13964210.226.36.2 389 udp ldap unknown
13965210.226.36.2 445 tcp microsoft-ds closed
13966210.226.36.2 520 tcp efs filtered
13967210.226.36.2 520 udp route unknown
13968210.226.36.2 2049 tcp nfs filtered
13969210.226.36.2 2049 udp nfs unknown
13970217.160.131.142 21 tcp ftp open ProFTPD
13971217.160.131.142 22 tcp ssh open OpenSSH 5.3 protocol 2.0
13972217.160.131.142 53 tcp domain closed
13973217.160.131.142 53 udp domain unknown
13974217.160.131.142 67 tcp dhcps closed
13975217.160.131.142 67 udp dhcps unknown
13976217.160.131.142 68 tcp dhcpc closed
13977217.160.131.142 68 udp dhcpc closed
13978217.160.131.142 69 tcp tftp closed
13979217.160.131.142 69 udp tftp unknown
13980217.160.131.142 80 tcp http open Apache httpd PleskLin
13981217.160.131.142 88 tcp kerberos-sec closed
13982217.160.131.142 88 udp kerberos-sec unknown
13983217.160.131.142 123 tcp ntp closed
13984217.160.131.142 123 udp ntp unknown
13985217.160.131.142 137 tcp netbios-ns closed
13986217.160.131.142 137 udp netbios-ns filtered
13987217.160.131.142 138 tcp netbios-dgm closed
13988217.160.131.142 138 udp netbios-dgm filtered
13989217.160.131.142 139 tcp netbios-ssn closed
13990217.160.131.142 139 udp netbios-ssn closed
13991217.160.131.142 161 tcp snmp closed
13992217.160.131.142 161 udp snmp unknown
13993217.160.131.142 162 tcp snmptrap closed
13994217.160.131.142 162 udp snmptrap closed
13995217.160.131.142 389 tcp ldap closed
13996217.160.131.142 389 udp ldap closed
13997217.160.131.142 443 tcp ssl/http open Apache httpd PleskLin
13998217.160.131.142 520 tcp efs closed
13999217.160.131.142 520 udp route unknown
14000217.160.131.142 2049 tcp nfs closed
14001217.160.131.142 2049 udp nfs closed
14002217.160.131.142 3306 tcp mysql open MySQL 5.1.73
14003217.160.131.142 4643 tcp ssl/http open Apache httpd
14004217.160.131.142 8443 tcp ssl/http open sw-cp-server httpd Plesk Onyx 17.8.11
14005217.160.131.142 8880 tcp http open sw-cp-server httpd Plesk Onyx 17.8.11
14006###################################################################################################################################
14007 Anonymous JTSEC #OpDeathEathers Full Recon #11