· 5 years ago · Mar 30, 2020, 12:34 PM
1##################################################################################################################################
2==================================================================================================================================
3Hostname www.igemar.cl ISP Amazon.com, Inc.
4Continent North America Flag
5US
6Country United States Country Code US
7Region California Local time 30 Mar 2020 03:50 PDT
8City San Jose Postal Code 95141
9IP Address 52.52.234.222 Latitude 37.339
10 Longitude -121.891
11==================================================================================================================================
12##################################################################################################################################
13Target:https://www.igemar.cl/
14IP:52.52.234.222
15##################################################################################################################################
16> set type=A
17> igemar.cl
18Server: 10.101.0.243
19Address: 10.101.0.243#53
20
21Non-authoritative answer:
22Name: igemar.cl
23Address: 52.52.234.222
24> set type=NS
25> igemar.cl
26Server: 10.101.0.243
27Address: 10.101.0.243#53
28
29Non-authoritative answer:
30igemar.cl nameserver = pub-ns2.redtogreen.cl.
31igemar.cl nameserver = pub-ns1.redtogreen.cl.
32
33Authoritative answers can be found from:
34> set type=MX
35> igemar.cl
36Server: 10.101.0.243
37Address: 10.101.0.243#53
38
39Non-authoritative answer:
40igemar.cl mail exchanger = 0 igemar-cl.mail.protection.outlook.com.
41
42Authoritative answers can be found from:
43##################################################################################################################################
44Domain name: igemar.cl
45Registrant name: Pesquera Iquique-Guanaye S.A. (PESQUERA IQUIQUE GUANAYE S A)
46Registrant organisation:
47Registrar name: NIC Chile
48Registrar URL: https://www.nic.cl
49Creation date: 1999-06-23 21:42:08 CLST
50Expiration date: 2022-07-19 17:42:00 CLST
51Name server: sigma-inter.sigma.cl
52Name server: sigma-inter2.sigma.cl
53################################################################################################################################
54[i] Scanning Site: https://www.igemar.cl
55
56
57
58B A S I C I N F O
59====================
60
61
62[+] Site Title:
63[+] IP address: 52.52.234.222
64[+] Web Server: Apache-Coyote/1.1
65[+] CMS: Could Not Detect
66[+] Cloudflare: Not Detected
67[+] Robots File: Could NOT Find robots.txt!
68
69
70
71
72W H O I S L O O K U P
73========================
74
75 %%
76%% This is the NIC Chile Whois server (whois.nic.cl).
77%%
78%% Rights restricted by copyright.
79%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
80%%
81
82Domain name: igemar.cl
83Registrant name: Pesquera Iquique-Guanaye S.A. (PESQUERA IQUIQUE GUANAYE S A)
84Registrant organisation:
85Registrar name: NIC Chile
86Registrar URL: https://www.nic.cl
87Creation date: 1999-06-23 21:42:08 CLST
88Expiration date: 2022-07-19 17:42:00 CLST
89Name server: sigma-inter.sigma.cl
90Name server: sigma-inter2.sigma.cl
91
92%%
93%% For communication with domain contacts please use website.
94%% See https://www.nic.cl/registry/Whois.do?d=igemar.cl
95%%
96
97
98
99
100G E O I P L O O K U P
101=========================
102
103[i] IP Address: 52.52.234.222
104[i] Country: United States
105[i] State: California
106[i] City: San Jose
107[i] Latitude: 37.3388
108[i] Longitude: -121.8914
109
110
111
112
113H T T P H E A D E R S
114=======================
115
116
117[i] HTTP/1.1 404 Not Found
118[i] Date: Mon, 30 Mar 2020 10:59:35 GMT
119[i] Server: Apache-Coyote/1.1
120[i] X-Content-Type-Options: nosniff
121[i] X-Frame-Options: SAMEORIGIN
122[i] X-XSS-Protection: 1
123[i] Liferay-Portal: Liferay Community Edition Portal 7.0.2 GA3 (Wilberforce / Build 7002 / August 5, 2016)
124[i] Content-Type: text/html;charset=UTF-8
125[i] Content-Length: 230802
126[i] Set-Cookie: JSESSIONID=675D76247BE939AE07DFF3B9A7E61BCD; Path=/; Secure; HttpOnly
127[i] Set-Cookie: COOKIE_SUPPORT=true; Expires=Tue, 30-Mar-2021 10:59:35 GMT; Path=/; Secure; HttpOnly
128[i] Set-Cookie: GUEST_LANGUAGE_ID=es_ES; Domain=.igemar.cl; Expires=Tue, 30-Mar-2021 10:59:35 GMT; Path=/; Secure; HttpOnly
129[i] Connection: close
130
131
132
133
134D N S L O O K U P
135===================
136
137igemar.cl. 3599 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
138igemar.cl. 3599 IN TXT "MS=ms52251860"
139igemar.cl. 29 IN SOA pub-ns1.redtogreen.cl. pub-ns2.redtogreen.cl. 2020022701 3600 3600 1209600 30
140igemar.cl. 29 IN A 52.52.234.222
141igemar.cl. 29 IN NS pub-ns2.redtogreen.cl.
142igemar.cl. 29 IN NS pub-ns1.redtogreen.cl.
143igemar.cl. 29 IN MX 0 igemar-cl.mail.protection.outlook.com.
144
145
146
147
148S U B N E T C A L C U L A T I O N
149====================================
150
151Address = 52.52.234.222
152Network = 52.52.234.222 / 32
153Netmask = 255.255.255.255
154Broadcast = not needed on Point-to-Point links
155Wildcard Mask = 0.0.0.0
156Hosts Bits = 0
157Max. Hosts = 1 (2^0 - 0)
158Host Range = { 52.52.234.222 - 52.52.234.222 }
159
160
161
162N M A P P O R T S C A N
163============================
164
165Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-30 10:59 UTC
166Nmap scan report for igemar.cl (52.52.234.222)
167Host is up (0.083s latency).
168rDNS record for 52.52.234.222: ec2-52-52-234-222.us-west-1.compute.amazonaws.com
169
170PORT STATE SERVICE
17121/tcp filtered ftp
17222/tcp filtered ssh
17380/tcp open http
174443/tcp open https
175
176Nmap done: 1 IP address (1 host up) scanned in 2.04 seconds
177
178
179
180S U B - D O M A I N F I N D E R
181==================================
182
183
184[i] Total Subdomains Found : 1
185
186[+] Subdomain: www.igemar.cl
187[-] IP: 52.52.234.222
188
189################################################################################################################################
190Trying "igemar.cl"
191;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51232
192;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 0
193
194;; QUESTION SECTION:
195;igemar.cl. IN ANY
196
197;; ANSWER SECTION:
198igemar.cl. 30 IN MX 0 igemar-cl.mail.protection.outlook.com.
199igemar.cl. 30 IN A 52.52.234.222
200igemar.cl. 30 IN SOA pub-ns1.redtogreen.cl. pub-ns2.redtogreen.cl. 2020022701 3600 3600 1209600 30
201igemar.cl. 3600 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
202igemar.cl. 3600 IN TXT "MS=ms52251860"
203igemar.cl. 30 IN NS pub-ns1.redtogreen.cl.
204igemar.cl. 30 IN NS pub-ns2.redtogreen.cl.
205
206Received 272 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 179 ms
207################################################################################################################################
208
209; <<>> DiG 9.11.16-2-Debian <<>> +trace igemar.cl any
210;; global options: +cmd
211. 86400 IN NS a.root-servers.net.
212. 86400 IN NS b.root-servers.net.
213. 86400 IN NS c.root-servers.net.
214. 86400 IN NS d.root-servers.net.
215. 86400 IN NS e.root-servers.net.
216. 86400 IN NS f.root-servers.net.
217. 86400 IN NS g.root-servers.net.
218. 86400 IN NS h.root-servers.net.
219. 86400 IN NS i.root-servers.net.
220. 86400 IN NS j.root-servers.net.
221. 86400 IN NS k.root-servers.net.
222. 86400 IN NS l.root-servers.net.
223. 86400 IN NS m.root-servers.net.
224. 86400 IN RRSIG NS 8 0 518400 20200412050000 20200330040000 33853 . NhQy8nm19ezGE3lHbnRZ5NyZUJBRkdaPY/WS9HDsOVRLk0b5pkiiyKzx BJeGLcbG/E+nHLb66nxxEflNW0xT+5mnmyCshLzxxVb8pnjDqxJRtziq qthDE7b86cPnkYWSCpbmt3K/QlRFi1K6jj4bqPYbhljNau7nPlQvzxp0 diPJ5SskMu+WQUfJE/vInw8IxdcwL7oP2QTNmld1hCr6zG3QAqMOywYY c9iO5klepvKTrIjAEQhMsv46tsJI2K621tnQHpaIXfnX5sdU/yrERkMX VVoU4AOl/XhVZ3Veqa5wU3RH8r30uRzZXSiDCJpJgWcs0ybL7KJEiGJZ C8zA0w==
225;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 116 ms
226
227cl. 172800 IN NS a.nic.cl.
228cl. 172800 IN NS b.nic.cl.
229cl. 172800 IN NS c.nic.cl.
230cl. 172800 IN NS cl1.dnsnode.net.
231cl. 172800 IN NS cl-ns.anycast.pch.net.
232cl. 172800 IN NS cl1-tld.d-zone.ca.
233cl. 172800 IN NS cl2-tld.d-zone.ca.
234cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
235cl. 86400 IN RRSIG DS 8 1 86400 20200412050000 20200330040000 33853 . bweA8m19xLhYIPaJRHgfW71Di3d71sKsyowcAF2ZaYfWZawOLe+r2o7w pgizdOhRhD1P6MDDS8E/PIK+2ltUsGGgViiTzpEtxa3wlRJiTyjeqi4w nUUb/scIDUPE54FGa/ktm7Xb4zGWpHmLAaNv+U3W3tBJpTcJlQ5AAKWo F3l32HQcCz7Cj8tZ0tRffu4UkJm8kguXWdJMeITn0pM4nwf2H8vjBMqm 5sfEIzuBuac6hf3rArpNQOM2Y5iGW2mmMEqL+117LF72xAXkDIR/UtO+ ItGkEVVwVR3MEXmgIpV3mwybhqfJeXbw7Fa5QsHQMekjMcZuorqtY3oy zFF71g==
236;; Received 819 bytes from 2001:500:2d::d#53(d.root-servers.net) in 27 ms
237
238igemar.cl. 3600 IN NS sigma-inter.sigma.cl.
239igemar.cl. 3600 IN NS sigma-inter2.sigma.cl.
2403rdnh9f7vvjpeje211mai3uriul53u2a.cl. 900 IN NSEC3 1 1 2 5ACB6C9C67A4C7548A36AE833191E619 3SI5FMA4CBKBGTCVFNVR3VS6E4OH6L3K NS SOA TXT RRSIG DNSKEY NSEC3PARAM
241r6blj6jpsf807v75o48mhm149r04o0na.cl. 900 IN NSEC3 1 1 2 5ACB6C9C67A4C7548A36AE833191E619 R9PG5A5GNJ5KNJFPNFMV9J2KARK948Q3 NS DS RRSIG
2423rdnh9f7vvjpeje211mai3uriul53u2a.cl. 900 IN RRSIG NSEC3 8 2 900 20200513025351 20200330100027 24384 cl. Sj6uwRYA2s/JN7M+++zWPUVMdSTaDNueOPnHgf1ntJxyZ7OXPs8cVQce NorjmvgeMyDp7JmGWPJfkxMgb5kF7174LPM4Se49dHU5pxT/IaorWP5g SRsPISn28/w6oU/Y4BIBFaRTxwmm0ZnSH5Ys2JrrimBUMIJjDDsaVEr6 QIE=
243r6blj6jpsf807v75o48mhm149r04o0na.cl. 900 IN RRSIG NSEC3 8 2 900 20200513190447 20200330100027 24384 cl. m4kAtDLN9ebXL3+eXZsknJbxZqqdjEQJSnDQg64kgLD4iL31q/py7zw3 Kpvkh6frnFKIcwfEQzSLzYMWjJIrtfLIcecGhyLuhABv4sqJ/d1WMH19 h+rox2lM9G5BHOnXYCSdVB+5uCSsOJrGZRRIEJYvsSCSFp0WWVrbNIVd Kys=
244;; Received 676 bytes from 2620:10a:80aa::56#53(cl1-tld.d-zone.ca) in 27 ms
245
246igemar.cl. 3600 IN TXT "MS=ms52251860"
247igemar.cl. 3600 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
248igemar.cl. 30 IN SOA pub-ns1.redtogreen.cl. pub-ns2.redtogreen.cl. 2020022701 3600 3600 1209600 30
249igemar.cl. 30 IN A 52.52.234.222
250igemar.cl. 30 IN NS pub-ns1.redtogreen.cl.
251igemar.cl. 30 IN NS pub-ns2.redtogreen.cl.
252igemar.cl. 30 IN MX 0 igemar-cl.mail.protection.outlook.com.
253;; Received 315 bytes from 164.77.211.200#53(sigma-inter.sigma.cl) in 328 ms
254#################################################################################################################################
255[*] Performing General Enumeration of Domain:igemar.cl
256[-] DNSSEC is not configured for igemar.cl
257[*] SOA pub-ns1.redtogreen.cl 164.77.211.200
258[*] NS pub-ns2.redtogreen.cl 200.54.240.104
259[*] NS pub-ns1.redtogreen.cl 164.77.211.200
260[*] Bind Version for 164.77.211.200 b'9.9.4-RedHat-9.9.4-74.el7_6.1'
261[*] MX igemar-cl.mail.protection.outlook.com 104.47.70.110
262[*] MX igemar-cl.mail.protection.outlook.com 104.47.58.110
263[*] A igemar.cl 52.52.234.222
264[*] Enumerating SRV Records
265[*] SRV _sipfederationtls._tcp.igemar.cl sipfed.online.lync.com 52.113.64.147 5061 1
266[*] SRV _sipfederationtls._tcp.igemar.cl sipfed.online.lync.com 2603:1047:0:2::b 5061 1
267[*] SRV _sip._tls.igemar.cl sipdir.online.lync.com 52.113.64.147 443 1
268[*] SRV _sip._tls.igemar.cl sipdir.online.lync.com 2603:1047:0:2::b 443 1
269[+] 4 Records Found
270################################################################################################################################
271[*] Processing domain igemar.cl
272[*] Using system resolvers ['10.101.0.243', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
273[+] Getting nameservers
274164.77.211.200 - pub-ns1.redtogreen.cl
275200.54.240.104 - pub-ns2.redtogreen.cl
276[-] Zone transfer failed
277
278[+] TXT records found
279"v=spf1 include:spf.protection.outlook.com -all"
280"MS=ms52251860"
281
282[+] MX records found, added to target list
2830 igemar-cl.mail.protection.outlook.com.
284
285[*] Scanning igemar.cl for A records
28652.52.234.222 - igemar.cl
28740.101.80.200 - autodiscover.igemar.cl
28840.101.12.8 - autodiscover.igemar.cl
28940.101.121.40 - autodiscover.igemar.cl
29040.101.12.56 - autodiscover.igemar.cl
29140.101.18.248 - autodiscover.igemar.cl
29252.97.152.216 - autodiscover.igemar.cl
29340.101.12.24 - autodiscover.igemar.cl
29452.97.155.120 - autodiscover.igemar.cl
29552.113.64.150 - lyncdiscover.igemar.cl
29640.126.9.6 - msoid.igemar.cl
29720.190.137.98 - msoid.igemar.cl
29820.190.137.96 - msoid.igemar.cl
29920.190.137.73 - msoid.igemar.cl
30040.126.9.73 - msoid.igemar.cl
30140.126.9.8 - msoid.igemar.cl
30220.190.137.69 - msoid.igemar.cl
30320.190.137.6 - msoid.igemar.cl
30452.113.64.147 - sip.igemar.cl
30552.52.234.222 - www.igemar.cl
306################################################################################################################################
307[*] TARGET: https://www.igemar.cl/
308[*] TARGET IP: 52.52.234.222
309[INFO] NO load balancer detected for www.igemar.cl...
310[*] DNS servers: pub-ns1.redtogreen.cl.
311 Apache-Coyote/1.1 Apache/2.2.34 (Amazon)
312[*] CC: US
313[*] Country: United States
314[*] RegionCode: CA
315[*] RegionName: California
316[*] City: San Jose
317[*] ASN: AS16509
318[*] BGP_PREFIX: 52.52.0.0/15
319[*] ISP: AMAZON-02, US
320[INFO] SSL/HTTPS certificate detected
321[*] Issuer: issuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA
322[*] Subject: subject=OU = Domain Control Validated, OU = COMODO SSL, CN = www.igemar.cl
323[INFO] DNS enumeration:
324[INFO] Possible abuse mails are:
325[*] abuse@igemar.cl
326[*] abuse@www.igemar.cl
327[INFO] NO PAC (Proxy Auto Configuration) file FOUND
328[ALERT] robots.txt file FOUND in http://www.igemar.cl/robots.txt
329[INFO] Checking for HTTP status codes recursively from http://www.igemar.cl/robots.txt
330[INFO] Status code Folders
331[INFO] Starting FUZZing in http://www.igemar.cl/FUzZzZzZzZz...
332[INFO] Status code Folders
333[*] 200 http://www.igemar.cl/index
334[*] 200 http://www.igemar.cl/images
335[*] 200 http://www.igemar.cl/download
336[*] 302 http://www.igemar.cl/2006
337[*] 302 http://www.igemar.cl/news
338[*] 302 http://www.igemar.cl/crack
339[*] 200 http://www.igemar.cl/serial
340[*] 200 http://www.igemar.cl/warez
341[*] 200 http://www.igemar.cl/full
342[*] 200 http://www.igemar.cl/12
343[ALERT] Look in the source code. It may contain passwords
344
345Recherche 52.52.234.222
346Connexion HTTP à 52.52.234.222
347Envoi de la requête HTTP.
348Requête HTTP envoyée. Attente de réponse.
349HTTP/1.1 302 Found
350Transfert de données terminé
351HTTP/1.1 302 Found
352Utilisation de https://52.52.234.222/
353Recherche 52.52.234.222
354Connexion HTTPS à 52.52.234.222
355
356lynx : accès impossible au fichier de départ http://52.52.234.222/
357[INFO] Links found from https://www.igemar.cl/ http://52.52.234.222/:
358[*] https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx
359[*] https://www.google.com/maps/embed?key=AIzaSyCAAN8L7pmMgSZQZ-HMPuIBH9xmnDcxpWQ&pb=!1m18!1m12!1m3!1d3330.3500716383255!2d-70.59469008435245!3d-33.414116480784415!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x9662cf3e0fa7a67f:0x300d0c7f976e2ec8!2sEl+Golf+150,+Las+Condes,+Región+Metropolitana!5e0!3m2!1sen!2scl!4v1486074188631
360[*] https://www.igemar.cl/
361[*] https://www.igemar.cl/#2013
362[*] https://www.igemar.cl/#2014
363[*] https://www.igemar.cl/#2015
364[*] https://www.igemar.cl/#2016
365[*] https://www.igemar.cl/#2017
366[*] https://www.igemar.cl/#2018
367[*] https://www.igemar.cl/#2019
368[*] https://www.igemar.cl/#accionistas
369[*] https://www.igemar.cl/#contactos
370[*] https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=es_ES
371[*] https://www.igemar.cl/#destacados
372[*] https://www.igemar.cl/documents/34275/126736/AR_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace
373[*] https://www.igemar.cl/documents/34275/126736/DR_201706.pdf/c5aefcdd-6c86-8b60-d514-805c618b75d8
374[*] https://www.igemar.cl/documents/34275/126736/HR_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb
375[*] https://www.igemar.cl/documents/34275/126736/IFRS_201706.pdf/b4605514-e843-6756-594b-4ef660aae018
376[*] https://www.igemar.cl/documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d
377[*] https://www.igemar.cl/documents/34275/183706/An%C3%A1lisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696
378[*] https://www.igemar.cl/documents/34275/183706/AR_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff
379[*] https://www.igemar.cl/documents/34275/183706/AR_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144
380[*] https://www.igemar.cl/documents/34275/183706/Declaraci%C3%B3n_de_responsabilidad91123000_201806.pdf/a44dabe7-3d36-e476-9644-4c7980528e5b
381[*] https://www.igemar.cl/documents/34275/183706/DR_91123000_201803.pdf/f2020d48-73bf-1c3a-5f63-0b3266066c5c
382[*] https://www.igemar.cl/documents/34275/183706/DR_dic2018.pdf/7fea0c9e-348f-8d84-b4e2-1aa698294dae
383[*] https://www.igemar.cl/documents/34275/183706/EEFF_dic2018.pdf/0a8f229d-297a-04db-4b0a-f9606116f292
384[*] https://www.igemar.cl/documents/34275/183706/EF_91123000_201803.pdf/2fb6a33e-8dad-f817-e979-533daa6af7f7
385[*] https://www.igemar.cl/documents/34275/183706/Estados_financieros_%28PDF%2991123000_201806.pdf/2030347b-3bfd-5fb2-22aa-fad3659620cf
386[*] https://www.igemar.cl/documents/34275/183706/Estados_financieros_%28pdf%2991123000_201809.pdf/a3023e02-5dc9-5ea1-9eaa-1811da323d34
387[*] https://www.igemar.cl/documents/34275/183706/Hechos_Relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378
388[*] https://www.igemar.cl/documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d
389[*] https://www.igemar.cl/documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7
390[*] https://www.igemar.cl/documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a
391[*] https://www.igemar.cl/documents/34275/242536/AR_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84
392[*] https://www.igemar.cl/documents/34275/242536/DR_201903.pdf/5a3a6a85-4c6d-265b-1106-efcd8f813b64
393[*] https://www.igemar.cl/documents/34275/242536/EF_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5
394[*] https://www.igemar.cl/documents/34275/242536/HR_201903.pdf/fdd1d57b-923e-edf6-6824-167f32acc23d
395[*] https://www.igemar.cl/documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3
396[*] https://www.igemar.cl/documents/34275/34696/175_modelo-prevencion-igemar_dic16.pdf/0b30cb27-619d-0b59-b6e5-26b675929a56
397[*] https://www.igemar.cl/documents/34275/34696/175_poli-tica-de-aportes-igemar.pdf/cd0c2d1c-c41b-a4a0-c396-6f4500b03068
398[*] https://www.igemar.cl/documents/34275/34696/175_procedimientos-de-gobierno-corporativo-igemar.pdf/ace5d64c-3d86-961b-b0b0-4e6430b6aa25
399[*] https://www.igemar.cl/documents/34275/34696/Codigo_etica_Igemar_agosto19.pdf/d4282dfb-db8c-ac29-b2f5-e7f693667b8c
400[*] https://www.igemar.cl/documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411
401[*] https://www.igemar.cl/documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39
402[*] https://www.igemar.cl/documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab
403[*] https://www.igemar.cl/documents/34275/34696/Polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89
404[*] https://www.igemar.cl/documents/34275/34699/180_hecho-esencial-octubre-2014.pdf/b64abc9a-5759-8b77-df03-8185002d839f
405[*] https://www.igemar.cl/documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d
406[*] https://www.igemar.cl/documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3
407[*] https://www.igemar.cl/documents/34275/34699/he_271218.pdf/63043daf-1684-47bf-04d1-e5dbc6a0d0c1
408[*] https://www.igemar.cl/documents/34275/34699/he_29032018.pdf/c6c62eb5-02f2-fd9b-9bbd-435e5920029f
409[*] https://www.igemar.cl/documents/34275/34699/Hecho-Esencial-08.03.2017.pdf/7adc5b06-b5b7-0f85-fd47-52406d333aa4
410[*] https://www.igemar.cl/documents/34275/34699/Hecho+Esencial+Junta+Igemar7deabril.pdf/d161a9bd-6609-ec8c-3cac-2689e54a46de
411[*] https://www.igemar.cl/documents/34275/34699/HE_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a
412[*] https://www.igemar.cl/documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636
413[*] https://www.igemar.cl/documents/34275/34699/hes_2017060103310.pdf/bd8e8303-fa78-1bc5-b2dd-9d82d3e1812a
414[*] https://www.igemar.cl/documents/34275/34699/H+E+Selecta.pdf/7c3fefe4-a733-c321-4e8c-d5e6000ccd43
415[*] https://www.igemar.cl/documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf
416[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34
417[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606
418[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda
419[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0
420[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64
421[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f
422[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124
423[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272
424[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0
425[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-2fe6-d6de-91e555d06cab
426[*] https://www.igemar.cl/documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f
427[*] https://www.igemar.cl/documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca
428[*] https://www.igemar.cl/documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313
429[*] https://www.igemar.cl/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303
430[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8
431[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e
432[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939
433[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado-diciembre-2015.pdf/65d7b10b-4ea9-a837-3ef2-e2fe13287f05
434[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1
435[*] https://www.igemar.cl/documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56
436[*] https://www.igemar.cl/documents/34275/34705/179_an-c3-a1lisis_razonado91123000_201403.pdf/e28f5c87-1717-7c78-393d-2de6bc271b2e
437[*] https://www.igemar.cl/documents/34275/34705/179_declaraci-c3-b3n_de_responsabilidad91123000_201403.pdf/7cf24895-138d-0b72-5406-85dadc3c030e
438[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201603.pdf/a59b5b7a-fd54-8d95-6aab-2a7cab84ab3f
439[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201606.pdf/d1bd918a-b3a4-ee28-a87b-b1d22f3a9d92
440[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201609.pdf/5f177679-f41c-fb2b-b40d-8296304e277b
441[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad_junio_2014.pdf/e451ce99-a95e-dd0e-8cd2-12b4b5f8f715
442[*] https://www.igemar.cl/documents/34275/34705/179_declaracion_responsabilidad-diciembre-2015.pdf/6a83b5c8-fa3a-a4c1-8905-c2aeaf8ab7a4
443[*] https://www.igemar.cl/documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d
444[*] https://www.igemar.cl/documents/34275/34705/179_eeff-diciembre-2015.pdf/4dff7d99-d5e1-18c3-2833-b73a15ce4e1a
445[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583
446[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d
447[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034
448[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201306.pdf/c4a361c7-50b7-f3f1-a805-75e2a9269ca1
449[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201309.pdf/24e942a5-4309-8476-2c72-874bb925c902
450[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201403.pdf/446a4b9a-bddb-a91d-8b3f-749db4eccecc
451[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201503.pdf/9400a47f-d767-b036-3e77-209138525624
452[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201603.pdf/84553bb2-9ec4-86fa-90f7-368139f3acf1
453[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201606.pdf/0885f4b0-a74d-dd6f-906a-b9c00e1e46c1
454[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201609.pdf/0ffd3142-10b5-814a-4705-472b024fb660
455[*] https://www.igemar.cl/documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705
456[*] https://www.igemar.cl/documents/34275/34705/179_estados-financieros-septiembre-2015.pdf/75bec3ce-229f-f182-d69f-3470ee9d60d0
457[*] https://www.igemar.cl/documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e
458[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201306.pdf/5b7df00d-0b37-4ba4-0021-3a34b88313dc
459[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e
460[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201403.pdf/d89861aa-771b-df93-97b9-eb2087747581
461[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc
462[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201603.pdf/4f5620ca-bb4c-9b83-4d56-4642048b6b42
463[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201606.pdf/ea39bb65-4d64-cbd0-258e-ccdf9f334f22
464[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201609.pdf/07c53b95-591a-77ca-fefc-d995bdfba1f3
465[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b
466[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes-diciembre-2015.pdf/99e15269-383d-b285-b4d8-f08d6db1de12
467[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_igemar_0313.pdf/70cdd43d-12d3-e6c3-1762-fad64b963f7d
468[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163
469[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_junio_2015.pdf/2171c120-6482-06a1-07e1-2d65099588a5
470[*] https://www.igemar.cl/documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da
471[*] https://www.igemar.cl/documents/34275/34705/179_hechos-relevantes-septiembre-2015.pdf/de515067-9408-85f9-5666-f2814362c514
472[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32
473[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e
474[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b
475[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314
476[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc
477[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c
478[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis_razonado_septiembre_2014.pdf/9b871d1e-0f95-0838-a7a4-fe807ffd2501
479[*] https://www.igemar.cl/documents/34275/34705/179_xa1lisis-razonado-septiembre-2015.pdf/522c0024-5563-9a06-1064-8bd797af9c37
480[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201306.pdf/9d751e76-f024-5628-6d91-fdf74aaa37ea
481[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201309.pdf/30f0d1bb-fae9-6cfd-3320-85f76c78a8fb
482[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201412.pdf/4727ab6b-16df-b7c4-bace-1d7c10331a33
483[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201503.pdf/bdc8140a-a884-3e3b-ce19-b178d6b45d6b
484[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_diciembre_2013.pdf/4fa057e0-59a5-3f5f-ad49-1dbe6bc1a850
485[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_igemar_0313.pdf/5737843e-896a-5fc0-a4d6-925298a7b7ee
486[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_junio_2015.pdf/d9c3f090-b779-48d0-1284-dccfc0a3cdd9
487[*] https://www.igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_septiembre_2014.pdf/ff313834-6517-aefb-84d4-90ef5daf0961
488[*] https://www.igemar.cl/documents/34275/34705/179_xb3n-responsabilidad-septiembre-2015.pdf/b71a50b7-beed-add9-9231-d7481221551a
489[*] https://www.igemar.cl/documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2
490[*] https://www.igemar.cl/documents/34275/34705/Declaracion_de_responsabilidad91123000_201712.pdf/ec60ec62-30c5-ed79-a12c-a28b378ce84a
491[*] https://www.igemar.cl/documents/34275/34705/Estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466
492[*] https://www.igemar.cl/documents/34275/34705/Hechos_Relevantes91123000_201503.pdf/261c32ea-ef6a-d334-5e83-4a795258016d
493[*] https://www.igemar.cl/documents/34275/34705/Hechos_Relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca
494[*] https://www.igemar.cl/documents/34275/34705/Igemar_AR_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17
495[*] https://www.igemar.cl/documents/34275/34705/Igemar_DR_2016.pdf/e0810c51-cca5-05f0-79a5-bb6409c42e52
496[*] https://www.igemar.cl/documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a
497[*] https://www.igemar.cl/documents/34275/34705/Igemar_HR_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63
498[*] https://www.igemar.cl/documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa
499[*] https://www.igemar.cl/documents/34275/34708/197_acta-junta-igemar.pdf/3c1a510b-5618-689c-e9d2-f9196a0eacbe
500[*] https://www.igemar.cl/documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1
501[*] https://www.igemar.cl/documents/34275/34708/Acta+Junta+2017+Igemar.pdf/cd44d4c4-b7e4-253b-ab6a-d400b4424943
502[*] https://www.igemar.cl/documents/34275/34708/ActaJuntaExtraordinaria2018.pdf/402fca9a-724f-5ac2-4218-aff51bd030d2
503[*] https://www.igemar.cl/documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f
504[*] https://www.igemar.cl/documents/34275/34708/ActaJuntaOrdinaria2018.pdf/145fe6a8-67dd-8bc3-83ad-db296dd1611f
505[*] https://www.igemar.cl/documents/34275/34708/Aviso_Junta2019_Igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499
506[*] https://www.igemar.cl/documents/34275/34708/candidatos2019_Igemar.pdf/b0b7dce7-2fc0-9920-8e0d-017a7446c672
507[*] https://www.igemar.cl/documents/34275/34708/Citacion_Junta2019_Igemar.pdf/8a126a9b-23bc-d68e-601c-6ae939ae3175
508[*] https://www.igemar.cl/documents/34275/34708/EEFF_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835
509[*] https://www.igemar.cl/documents/34275/34708/Fundamentos_Designacion_Auditores_Igemar.pdf/4f60033a-13ec-24e5-ff9a-3f741217f784
510[*] https://www.igemar.cl/documents/34275/34720/An%C3%A1lisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940
511[*] https://www.igemar.cl/documents/34275/34720/AR_0317.pdf/ae9b45e1-cca0-30e6-52f1-01d8cbd8ffb7
512[*] https://www.igemar.cl/documents/34275/34720/Declaraci%C3%B3n_de_responsabilidad91123000_201709.pdf/6d38b44a-d804-a70b-badf-b7d19be7ca27
513[*] https://www.igemar.cl/documents/34275/34720/DR0317.pdf/667adaa0-68c8-d457-c621-50670ca7650e
514[*] https://www.igemar.cl/documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a
515[*] https://www.igemar.cl/documents/34275/34720/Estados_financieros_%28PDF%2991123000_201709.pdf/7c422914-ee17-091d-f402-d058d322fc75
516[*] https://www.igemar.cl/documents/34275/34720/Hechos_Relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce
517[*] https://www.igemar.cl/documents/34275/34720/HR0317.pdf/b421cc79-1ac9-193b-e224-d499b853714a
518[*] https://www.igemar.cl/#gobierno
519[*] https://www.igemar.cl/#inversionistas
520[*] https://www.igemar.cl/#main-content
521[*] https://www.igemar.cl/#memorias
522[*] https://www.igemar.cl/#negocios
523[*] https://www.igemar.cl/#principal
524[*] https://www.igemar.cl/#quienessomos
525[*] https://www.igemar.cl/www.igemar.cl
526[*] http://www.corpesca.cl/
527[*] http://www.igemar.cl/
528[*] http://www.orizon.cl/
529[*] http://www.sercor.cl/
530cut: intervalle de champ incorrecte
531Saisissez « cut --help » pour plus d'informations.
532[INFO] Shodan detected the following opened ports on 52.52.234.222:
533[*] 443
534[*] 80
535[INFO] ------VirusTotal SECTION------
536[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
537[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
538[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
539[INFO] ------Alexa Rank SECTION------
540[INFO] Percent of Visitors Rank in Country:
541[INFO] Percent of Search Traffic:
542[INFO] Percent of Unique Visits:
543[INFO] Total Sites Linking In:
544[*] Total Sites
545[INFO] Useful links related to www.igemar.cl - 52.52.234.222:
546[*] https://www.virustotal.com/pt/ip-address/52.52.234.222/information/
547[*] https://www.hybrid-analysis.com/search?host=52.52.234.222
548[*] https://www.shodan.io/host/52.52.234.222
549[*] https://www.senderbase.org/lookup/?search_string=52.52.234.222
550[*] https://www.alienvault.com/open-threat-exchange/ip/52.52.234.222
551[*] http://pastebin.com/search?q=52.52.234.222
552[*] http://urlquery.net/search.php?q=52.52.234.222
553[*] http://www.alexa.com/siteinfo/www.igemar.cl
554[*] http://www.google.com/safebrowsing/diagnostic?site=www.igemar.cl
555[*] https://censys.io/ipv4/52.52.234.222
556[*] https://www.abuseipdb.com/check/52.52.234.222
557[*] https://urlscan.io/search/#52.52.234.222
558[*] https://github.com/search?q=52.52.234.222&type=Code
559[INFO] Useful links related to AS16509 - 52.52.0.0/15:
560[*] http://www.google.com/safebrowsing/diagnostic?site=AS:16509
561[*] https://www.senderbase.org/lookup/?search_string=52.52.0.0/15
562[*] http://bgp.he.net/AS16509
563[*] https://stat.ripe.net/AS16509
564[INFO] Date: 30/03/20 | Time: 07:12:42
565[INFO] Total time: 4 minute(s) and 53 second(s)
566###############################################################################################################################
567[*] IPs found: 1
568-------------------
56952.52.234.222
570
571[*] Emails found: 4
572----------------------
573abuse@igemar.cl
574gerenciageneral@igemar.cl
575pixel-1585567086955817-web-@igemar.cl
576
577[*] Hosts found: 388
578---------------------
579127.0.0.1.www.igemar.cl:
5807ww.igemar.cl:
581admin.www.igemar.cl:
582administration.www.igemar.cl:
583ads.www.igemar.cl:
584adserver.www.igemar.cl:
585alerts.www.igemar.cl:
586alpha.www.igemar.cl:
587ap.www.igemar.cl:
588apache.www.igemar.cl:
589api.www.igemar.cl:
590app.www.igemar.cl:
591apps.www.igemar.cl:
592appserver.www.igemar.cl:
593aptest.www.igemar.cl:
594auth.www.igemar.cl:
595backup.www.igemar.cl:
596beta.www.igemar.cl:
597blog.www.igemar.cl:
598cdn.www.igemar.cl:
599chat.www.igemar.cl:
600citrix.www.igemar.cl:
601cms.www.igemar.cl:
602corp.www.igemar.cl:
603crs.www.igemar.cl:
604cvs.www.igemar.cl:
605dashboard.www.igemar.cl:
606database.www.igemar.cl:
607db.www.igemar.cl:
608demo.www.igemar.cl:
609dev.www.igemar.cl:
610devel.www.igemar.cl:
611development.www.igemar.cl:
612devsql.www.igemar.cl:
613devtest.www.igemar.cl:
614dhcp.www.igemar.cl:
615direct.www.igemar.cl:
616dmz.www.igemar.cl:
617dns.www.igemar.cl:
618dns0.www.igemar.cl:
619dns1.www.igemar.cl:
620dns2.www.igemar.cl:
621download.www.igemar.cl:
622eew.igemar.cl:
623en.www.igemar.cl:
624erp.www.igemar.cl:
625eshop.www.igemar.cl:
626eww.igemar.cl:
627exchange.www.igemar.cl:
628f5.www.igemar.cl:
629fileserver.www.igemar.cl:
630firewall.www.igemar.cl:
631forum.www.igemar.cl:
632ftp.www.igemar.cl:
633ftp0.www.igemar.cl:
634git.www.igemar.cl:
635gw.www.igemar.cl:
636gww.igemar.cl:
637help.www.igemar.cl:
638helpdesk.www.igemar.cl:
639home.www.igemar.cl:
640host.www.igemar.cl:
641id.www.igemar.cl:
642igemar.cl:52.52.234.222
643igemar.cl:52.52.234.222
644igemar.cl:52.52.234.222
645igemar.cl/&:
646igemar.cl/12:
647igemar.cl/2006:
648igemar.cl/c/portal/update_language:
649igemar.cl/combo:
650igemar.cl/crack:
651igemar.cl/documents/34275/126736/ar_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace:
652igemar.cl/documents/34275/126736/dr_201706.pdf/c5aefcdd-6c86-8b60-d514-805c618b75d8:
653igemar.cl/documents/34275/126736/hr_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb:
654igemar.cl/documents/34275/126736/ifrs_201706.pdf/b4605514-e843-6756-594b-4ef660aae018:
655igemar.cl/documents/34275/183706/an%25c3%25a1lisis_razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696:
656igemar.cl/documents/34275/183706/an%c3%83%c2%a1lisis_razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696:
657igemar.cl/documents/34275/183706/an%c3%a1lisis_razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696:
658igemar.cl/documents/34275/183706/analisis_razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d:
659igemar.cl/documents/34275/183706/ar_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff:
660igemar.cl/documents/34275/183706/ar_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144:
661igemar.cl/documents/34275/183706/declaraci%c3%b3n_de_responsabilidad91123000_201806.pdf/a44dabe7-3d36-e476-9644-4c7980528e5b:
662igemar.cl/documents/34275/183706/dr_91123000_201803.pdf/f2020d48-73bf-1c3a-5f63-0b3266066c5c:
663igemar.cl/documents/34275/183706/dr_dic2018.pdf/7fea0c9e-348f-8d84-b4e2-1aa698294dae:
664igemar.cl/documents/34275/183706/eeff_dic2018.pdf/0a8f229d-297a-04db-4b0a-f9606116f292:
665igemar.cl/documents/34275/183706/ef_91123000_201803.pdf/b6a33e-8dad-f817-e979-533daa6af7f7:
666igemar.cl/documents/34275/183706/estados_financieros_%28pdf%2991123000_201806.pdf/2030347b-3bfd-5fb2-22aa-fad3659620cf:
667igemar.cl/documents/34275/183706/estados_financieros_%28pdf%2991123000_201809.pdf/a3023e02-5dc9-5ea1-9eaa-1811da323d34:
668igemar.cl/documents/34275/183706/hechos_relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378:
669igemar.cl/documents/34275/183706/hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d:
670igemar.cl/documents/34275/183706/hr_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7:
671igemar.cl/documents/34275/183706/hr_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a:
672igemar.cl/documents/34275/242536/ar_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84:
673igemar.cl/documents/34275/242536/dr_201903.pdf/5a3a6a85-4c6d-265b-1106-efcd8f813b64:
674igemar.cl/documents/34275/242536/ef_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5:
675igemar.cl/documents/34275/242536/hr_201903.pdf/fdd1d57b-923e-edf6-6824-167f32acc23d:
676igemar.cl/documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3:
677igemar.cl/documents/34275/34696/175_adopcion_practicas_igemar2015.pdf/f38cfd3b-ea82-3ce9-da3b-fab1c4116a3c:
678igemar.cl/documents/34275/34696/175_codigo-de-etica-igemar.pdf:
679igemar.cl/documents/34275/34696/175_modelo-prevencion-igemar_dic16.pdf/0b30cb27-619d-0b59-b6e5-26b675929a56:
680igemar.cl/documents/34275/34696/175_poli-tica-de-aportes-igemar.pdf/cd0c2d1c-c41b-a4a0-c396-6f4500b03068:
681igemar.cl/documents/34275/34696/175_procedimientos-de-gobierno-corporativo-igemar.pdf/ace5d64c-3d86-961b-b0b0-4e6430b6aa25:
682igemar.cl/documents/34275/34696/adopcion_practicas_igemar.pdf/87cd182d-4c19-c79b-de64-482e6639e3c8:
683igemar.cl/documents/34275/34696/codigo_etica_igemar_agosto19.pdf/d4282dfb-db8c-ac29-b5-e7f693667b8c:
684igemar.cl/documents/34275/34696/igemar_cod_etica_2018.pdf/e78c57b7-df7a-ba65-358b-338a8dee3790:
685igemar.cl/documents/34275/34696/linea_directa_igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411:
686igemar.cl/documents/34275/34696/manual_manejo_info_igemar.pdf/8bce76e4-9c0f-59a9-21ad-6e682350de3f:
687igemar.cl/documents/34275/34696/polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89:
688igemar.cl/documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39:
689igemar.cl/documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab:
690igemar.cl/documents/34275/34696/politica_prevencion_delitos_igemar.pdf/12d69642-77d7-6a8a-021a-35acdcdb745d:
691igemar.cl/documents/34275/34696/practicas_gobierno_corporativo_2018_igemar.pdf/f18f770b-2296-4386-fd63-f84efcd73c9b:
692igemar.cl/documents/34275/34699/180_hecho-esencial-octubre-2014.pdf/b64abc9a-5759-8b77-df03-8185002d839f:
693igemar.cl/documents/34275/34699/h+e+selecta.pdf/7c3fefe4-a733-c321-4e8c-d5e6000ccd43:
694igemar.cl/documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d:
695igemar.cl/documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3:
696igemar.cl/documents/34275/34699/he_271218.pdf/63043daf-1684-47bf-04d1-e5dbc6a0d0c1:
697igemar.cl/documents/34275/34699/he_29032018.pdf/c6c62eb5-02-fd9b-9bbd-435e5920029f:
698igemar.cl/documents/34275/34699/he_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a:
699igemar.cl/documents/34275/34699/he_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636:
700igemar.cl/documents/34275/34699/hecho+esencial+junta+igemar7deabril.pdf/d161a9bd-6609-ec8c-3cac-2689e54a46de:
701igemar.cl/documents/34275/34699/hecho-esencial-08.03.2017.pdf/7adc5b06-b5b7-0f85-fd47-52406d333aa4:
702igemar.cl/documents/34275/34699/hes_2017060103310.pdf/bd8e8303-fa78-1bc5-b2dd-9d82d3e1812a:
703igemar.cl/documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf:
704igemar.cl/documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f:
705igemar.cl/documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34:
706igemar.cl/documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606:
707igemar.cl/documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda:
708igemar.cl/documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0:
709igemar.cl/documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64:
710igemar.cl/documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f:
711igemar.cl/documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124:
712igemar.cl/documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272:
713igemar.cl/documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0:
714igemar.cl/documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-e6-d6de-91e555d06cab:
715igemar.cl/documents/34275/34702/igemar_memoria_2016_svs.pdf/3e39aced-fedf-5062-3715-30b03aef5aca:
716igemar.cl/documents/34275/34702/igemar_memoria_2017_svs.pdf/4aed403c-c416-0d87-1619-9c40f6b059e3:
717igemar.cl/documents/34275/34702/memoria_anual_igemar_2016.pdf/238a6538-3ab6-9ef9-473d-465d93d94108:
718igemar.cl/documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303:
719igemar.cl/documents/34275/34702/memoriaanual2018_igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313:
720igemar.cl/documents/34275/34705/179_an-c3-a1lisis_razonado91123000_201403.pdf/e28f5c87-1717-7c78-393d-2de6bc271b2e:
721igemar.cl/documents/34275/34705/179_analisis_razonado-diciembre-2015.pdf/65d7b10b-4ea9-a837-3ef2-ee13287f05:
722igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8:
723igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e:
724igemar.cl/documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939:
725igemar.cl/documents/34275/34705/179_analisis_razonado_diciembre_2011.pdf/08d1a3de-38ec-9f3a-5fc8-9dcdbc9b604a:
726igemar.cl/documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f5-4c5bec1b1ed1:
727igemar.cl/documents/34275/34705/179_analisis_razonado_junio_2011.pdf/41d53ca3-1b1e-5723-8e05-de90b20562a9:
728igemar.cl/documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56:
729igemar.cl/documents/34275/34705/179_analisis_razonado_marzo_2012.pdf/4a6338bb-ee36-b63c-d5be-51b597c9427a:
730igemar.cl/documents/34275/34705/179_declaraci-c3-b3n_de_responsabilidad91123000_201403.pdf/7cf24895-138d-0b72-5406-85dadc3c030e:
731igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201603.pdf/a59b5b7a-fd54-8d95-6aab-2a7cab84ab3f:
732igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201606.pdf/d1bd918a-b3a4-ee28-a87b-b1d23a9d92:
733igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad91123000_201609.pdf/5f177679-f41c-fb2b-b40d-8296304e277b:
734igemar.cl/documents/34275/34705/179_declaracion_de_responsabilidad_junio_2014.pdf/e451ce99-a95e-dd0e-8cd2-12b4b5f8f715:
735igemar.cl/documents/34275/34705/179_declaracion_responsabilidad-diciembre-2015.pdf/6a83b5c8-fa3a-a4c1-8905-c2aeaf8ab7a4:
736igemar.cl/documents/34275/34705/179_eeff-diciembre-2015.pdf/4dff7d99-d5e1-18c3-2833-b73a15ce4e1a:
737igemar.cl/documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d:
738igemar.cl/documents/34275/34705/179_estados-financieros-septiembre-2015.pdf/75bec3ce-229f-f182-d69f-3470ee9d60d0:
739igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201306.pdf/c4a361c7-50b7-f3f1-a805-75e2a9269ca1:
740igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201309.pdf/24e942a5-4309-8476-2c72-874bb925c902:
741igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201403.pdf/446a4b9a-bddb-a91d-8b3f-749db4eccecc:
742igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201503.pdf/9400a47f-d767-b036-3e77-209138525624:
743igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201603.pdf/84553bb2-9ec4-86fa-90f7-368139f3acf1:
744igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201606.pdf/0885f4b0-a74d-dd6f-906a-b9c00e1e46c1:
745igemar.cl/documents/34275/34705/179_estados_financieros_-pdf-91123000_201609.pdf/0ffd3142-10b5-814a-4705-472b024fb660:
746igemar.cl/documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583:
747igemar.cl/documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d:
748igemar.cl/documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034:
749igemar.cl/documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705:
750igemar.cl/documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e:
751igemar.cl/documents/34275/34705/179_hechos-relevantes-septiembre-2015.pdf/de515067-9408-85f9-5666-f2814362c514:
752igemar.cl/documents/34275/34705/179_hechos_relevantes-diciembre-2015.pdf/99e15269-383d-b285-b4d8-f08d6db1de12:
753igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201306.pdf/5b7df00d-0b37-4ba4-0021-3a34b88313dc:
754igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e:
755igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201403.pdf/d89861aa-771b-df93-97b9-eb2087747581:
756igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc:
757igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201603.pdf/4f5620ca-bb4c-9b83-4d56-4642048b6b42:
758igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201606.pdf/ea39bb65-4d64-cbd0-258e-ccdf9f334f22:
759igemar.cl/documents/34275/34705/179_hechos_relevantes91123000_201609.pdf/07c53b95-591a-77ca-fefc-d995bdfba1f3:
760igemar.cl/documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b:
761igemar.cl/documents/34275/34705/179_hechos_relevantes_igemar_0313.pdf/70cdd43d-12d3-e6c3-1762-fad64b963f7d:
762igemar.cl/documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163:
763igemar.cl/documents/34275/34705/179_hechos_relevantes_junio_2015.pdf/2171c120-6482-06a1-07e1-2d65099588a5:
764igemar.cl/documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da:
765igemar.cl/documents/34275/34705/179_informe_ifrs_diciembre_2009.pdf/00704054-fd88-b994-3f03-96cee5898ee6:
766igemar.cl/documents/34275/34705/179_informe_ifrs_diciembre_2011.pdf/bae828b8-e3fe-7d47-a858-4af18ed3e701:
767igemar.cl/documents/34275/34705/179_informe_ifrs_junio2009.pdf/8dc4bf28-8651-1f28-93b1-afac6a5f3c0e:
768igemar.cl/documents/34275/34705/179_informe_ifrs_marzo_2011.pdf/53d23c52-cc67-bd26-a4c8-009c5ca449:
769igemar.cl/documents/34275/34705/179_xa1lisis-razonado-septiembre-2015.pdf/522c0024-5563-9a06-1064-8bd797af9c37:
770igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32:
771igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e:
772igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b:
773igemar.cl/documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314:
774igemar.cl/documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a9272d-4b77-a19f-8049-bba15d2327cc:
775igemar.cl/documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c:
776igemar.cl/documents/34275/34705/179_xa1lisis_razonado_septiembre_2014.pdf/9b871d1e-0f95-0838-a7a4-fe807ffd2501:
777igemar.cl/documents/34275/34705/179_xb3n-responsabilidad-septiembre-2015.pdf/b71a50b7-beed-add9-9231-d7481221551a:
778igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201306.pdf/9d751e76-f024-5628-6d91-fdf74aaa37ea:
779igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201309.pdf/30f0d1bb-fae9-6cfd-3320-85f76c78a8fb:
780igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201412.pdf/4727ab6b-16df-b7c4-bace-1d7c10331a33:
781igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad91123000_201503.pdf/bdc8140a-a884-3e3b-ce19-b178d6b45d6b:
782igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_diciembre_2013.pdf/4fa057e0-59a5-3f5f-ad49-1dbe6bc1a850:
783igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_igemar_0313.pdf/5737843e-896a-5fc0-a4d6-925298a7b7ee:
784igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_junio_2015.pdf/d9c3f090-b779-48d0-1284-dccfc0a3cdd9:
785igemar.cl/documents/34275/34705/179_xb3n_de_responsabilidad_septiembre_2014.pdf/ff313834-6517-aefb-84d4-90ef5daf0961:
786igemar.cl/documents/34275/34705/analisis_razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2:
787igemar.cl/documents/34275/34705/declaracion_de_responsabilidad91123000_201712.pdf/ec60ec62-30c5-ed79-a12c-a28b378ce84a:
788igemar.cl/documents/34275/34705/estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466:
789igemar.cl/documents/34275/34705/hechos_relevantes91123000_201503.pdf/261c32ea-ef6a-d334-5e83-4a795258016d:
790igemar.cl/documents/34275/34705/hechos_relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca:
791igemar.cl/documents/34275/34705/igemar_ar_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17:
792igemar.cl/documents/34275/34705/igemar_dr_2016.pdf/e0810c51-cca5-05f0-79a5-bb6409c42e52:
793igemar.cl/documents/34275/34705/igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a:
794igemar.cl/documents/34275/34705/igemar_hr_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63:
795igemar.cl/documents/34275/34708/197_acta-junta-igemar.pdf/3c1a510b-5618-689c-e9d2-f9196a0eacbe:
796igemar.cl/documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa:
797igemar.cl/documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1:
798igemar.cl/documents/34275/34708/acta+junta+2017+igemar.pdf/cd44d4c4-b7e4-253b-ab6a-d400b4424943:
799igemar.cl/documents/34275/34708/acta_junta_igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f:
800igemar.cl/documents/34275/34708/actajuntaextraordinaria2018.pdf/40ca9a-724f-5ac2-4218-aff51bd030d2:
801igemar.cl/documents/34275/34708/actajuntaordinaria2018.pdf/145fe6a8-67dd-8bc3-83ad-db296dd1611f:
802igemar.cl/documents/34275/34708/aviso_junta2019_igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499:
803igemar.cl/documents/34275/34708/aviso_junta_igemar_2018.pdf/fa8c7b01-ddb3-04f8-70cb-fb2cfcf685c8:
804igemar.cl/documents/34275/34708/candidatos2019_igemar.pdf/b0b7dce7-c0-9920-8e0d-017a7446c672:
805igemar.cl/documents/34275/34708/citacion_accionistas_igemar_2018.pdf/70247ae8-8363-59bb-6672-647117481524:
806igemar.cl/documents/34275/34708/citacion_junta2019_igemar.pdf/8a126a9b-23bc-d68e-601c-6ae939ae3175:
807igemar.cl/documents/34275/34708/eeff_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835:
808igemar.cl/documents/34275/34708/fundamentos_designacion_auditores_igemar.pdf/4f60033a-13ec-24e5-ff9a-3f741217f784:
809igemar.cl/documents/34275/34708/fundamentos_junta_extra_2018.pdf/a635a271-55f1-a149-f6a1-93eee10b441c:
810igemar.cl/documents/34275/34720/an%c3%83%c2%a1lisis_razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940:
811igemar.cl/documents/34275/34720/an%c3%a1lisis_razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940:
812igemar.cl/documents/34275/34720/ar_0317.pdf/ae9b45e1-cca0-30e6-51-01d8cbd8ffb7:
813igemar.cl/documents/34275/34720/declaraci%c3%b3n_de_responsabilidad91123000_201709.pdf/6d38b44a-d804-a70b-badf-b7d19be7ca27:
814igemar.cl/documents/34275/34720/dr0317.pdf/667adaa0-68c8-d457-c621-50670ca7650e:
815igemar.cl/documents/34275/34720/eff0317.pdf/231e310b-2d87-fa78-320d-58da1762137a:
816igemar.cl/documents/34275/34720/estados_financieros_%28pdf%2991123000_201709.pdf/7c422914-ee17-091d-f402-d058d32c75:
817igemar.cl/documents/34275/34720/hechos_relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce:
818igemar.cl/documents/34275/34720/hr0317.pdf/b421cc79-1ac9-193b-e224-d499b853714a:
819igemar.cl/download:
820igemar.cl/en/group/control_panel:
821igemar.cl/en/web/guest:
822igemar.cl/full:
823igemar.cl/images:
824igemar.cl/index:
825igemar.cl/news:
826igemar.cl/o/dynamic-data-mapping-form-renderer/css/main.css:
827igemar.cl/o/igemar-theme-v-4-theme/css/jquery.fullpage.css:
828igemar.cl/o/igemar-theme-v-4-theme/images/favicon.ico:
829igemar.cl/o/igemar-theme-v-4-theme/images/favicon.png:
830igemar.cl/o/mentions-web/css/mentions.css:
831igemar.cl/principal:
832igemar.cl/robots.txt:
833igemar.cl/serial:
834igemar.cl/sitemap.xml:
835igemar.cl/warez:
836igemar.cl/web/guest:
837igemar.cl/www.igemar.cl:
838images.www.igemar.cl:
839info.www.igemar.cl:
840internal.www.igemar.cl:
841internet.www.igemar.cl:
842intra.www.igemar.cl:
843intranet.www.igemar.cl:
844inurlbr-www.igemar.cl:
845ipv6.www.igemar.cl:
846lab.www.igemar.cl:
847ldap.www.igemar.cl:
848linux.www.igemar.cl:
849local.www.igemar.cl:
850localhost.www.igemar.cl:
851log.www.igemar.cl:
852m.www.igemar.cl:
853mail.www.igemar.cl:
854mail2.www.igemar.cl:
855mail3.www.igemar.cl:
856mailgate.www.igemar.cl:
857main.www.igemar.cl:
858manage.www.igemar.cl:
859mgmt.www.igemar.cl:
860mirror.www.igemar.cl:
861mobile.www.igemar.cl:
862monitor.www.igemar.cl:
863mssql.www.igemar.cl:
864mta.www.igemar.cl:
865mx.www.igemar.cl:
866mx0.www.igemar.cl:
867mx1.www.igemar.cl:
868mysql.www.igemar.cl:
869news.www.igemar.cl:
870noc.www.igemar.cl:
871ns.www.igemar.cl:
872ns0.www.igemar.cl:
873ns1.www.igemar.cl:
874ns2.www.igemar.cl:
875ns3.www.igemar.cl:
876ntp.www.igemar.cl:
877old.www.igemar.cl:
878ops.www.igemar.cl:
879oracle.www.igemar.cl:
880owa.www.igemar.cl:
881pbx.www.igemar.cl:
882portal.www.igemar.cl:
883qqw.igemar.cl:
884qww.igemar.cl:
885s3.www.igemar.cl:
886secure.www.igemar.cl:
887server.www.igemar.cl:
888sharepoint.www.igemar.cl:
889shop.www.igemar.cl:
890sip.www.igemar.cl:
891smtp.www.igemar.cl:
892sql.www.igemar.cl:
893squid.www.igemar.cl:
894ssh.www.igemar.cl:
895ssl.www.igemar.cl:
896stage.www.igemar.cl:
897staging.www.igemar.cl:
898stats.www.igemar.cl:
899status.www.igemar.cl:
900svn.www.igemar.cl:
901sww.igemar.cl:
902syslog.www.igemar.cl:
903test.www.igemar.cl:
904test1.www.igemar.cl:
905test2.www.igemar.cl:
906testing.www.igemar.cl:
907uat.www.igemar.cl:
908upload.www.igemar.cl:
909uww.igemar.cl:
910v1.www.igemar.cl:
911v2.www.igemar.cl:
912v3.www.igemar.cl:
913vm.www.igemar.cl:
914vnc.www.igemar.cl:
915voip.www.igemar.cl:
916vpn.www.igemar.cl:
917vvvvvv.igemar.cl:
918vvvvw.igemar.cl:
919vvwvv.igemar.cl:
920vvww.igemar.cl:
921vww.igemar.cl:
922w.igemar.cl:
923w7w.igemar.cl:
924web.www.igemar.cl:
925web2test.www.igemar.cl:
926wee.igemar.cl:
927wew.igemar.cl:
928weww.igemar.cl:
929wgw.igemar.cl:
930whois.www.igemar.cl:
931wiki.www.igemar.cl:
932wqq.igemar.cl:
933wqw.igemar.cl:
934wqww.igemar.cl:
935wsw.igemar.cl:
936wuw.igemar.cl:
937wvvvv.igemar.cl:
938wvvw.igemar.cl:
939wvw.igemar.cl:
940ww.igemar.cl:
941ww7.igemar.cl:
942wwe.igemar.cl:
943wwew.igemar.cl:
944wwg.igemar.cl:
945wwq.igemar.cl:
946wwqw.igemar.cl:
947wws.igemar.cl:
948wwu.igemar.cl:
949wwv.igemar.cl:
950wwvv.igemar.cl:
951www.igemar.cl:52.52.234.222
952www.igemar.cl:52.52.234.222
953www.igemar.cl:52.52.234.222
954www.igemar.cl:52.52.234.222
955www.igemar.cl:52.52.234.222
956www.igemar.cl:52.52.234.222
957www.igemar.cl:52.52.234.222
958www.igemar.cl:52.52.234.222
959www2.www.igemar.cl:
960wwwe.igemar.cl:
961wwwq.igemar.cl:
962wwww.igemar.cl:
963wwwwww.igemar.cl:
964xml.www.igemar.cl:
965#################################################################################################################################
966[+] Target : https://www.igemar.cl
967
968[+] IP Address : 52.52.234.222
969
970[+] Headers :
971
972[+] Date : Mon, 30 Mar 2020 11:02:52 GMT
973[+] Server : Apache-Coyote/1.1
974[+] X-Content-Type-Options : nosniff
975[+] X-Frame-Options : SAMEORIGIN
976[+] X-XSS-Protection : 1
977[+] Content-Encoding : gzip
978[+] Liferay-Portal : Liferay Community Edition Portal 7.0.2 GA3 (Wilberforce / Build 7002 / August 5, 2016)
979[+] Content-Type : text/html;charset=UTF-8
980[+] Set-Cookie : JSESSIONID=E2FD75194427794CC28A0519D0460E9E; Path=/; Secure; HttpOnly, COOKIE_SUPPORT=true; Expires=Tue, 30-Mar-2021 11:02:52 GMT; Path=/; Secure; HttpOnly, GUEST_LANGUAGE_ID=es_ES; Domain=.igemar.cl; Expires=Tue, 30-Mar-2021 11:02:52 GMT; Path=/; Secure; HttpOnly
981[+] Keep-Alive : timeout=15, max=100
982[+] Connection : Keep-Alive
983[+] Transfer-Encoding : chunked
984
985[!] SSL Certificate Information :
986
987[+] organizationalUnitName : COMODO SSL
988[+] commonName : www.igemar.cl
989[+] countryName : GB
990[+] stateOrProvinceName : Greater Manchester
991[+] localityName : Salford
992[+] organizationName : Sectigo Limited
993[+] commonName : Sectigo RSA Domain Validation Secure Server CA
994[+] version : 3
995[+] serialNumber : DBD566A0E3C97906A49F3DD40503CAE1
996[+] notBefore : Apr 10 00:00:00 2019 GMT
997[+] notAfter : Apr 9 23:59:59 2021 GMT
998[+] OCSP : http://ocsp.sectigo.com
999[+] caIssuers : http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
1000
1001[!] Whois Lookup :
1002
1003[+] asn_registry : arin
1004[+] asn : 16509
1005[+] asn_cidr : 52.52.0.0/15
1006[+] asn_country_code : US
1007[+] asn_date : 2015-09-02
1008[+] query : 52.52.234.222
1009[+] cidr : 52.32.0.0/11
1010[+] name : AT-88-Z
1011[+] handle : NET-52-32-0-0-1
1012[+] range : 52.32.0.0 - 52.63.255.255
1013[+] description : Amazon Technologies Inc.
1014[+] country : US
1015[+] state : WA
1016[+] city : Seattle
1017[+] address : 410 Terry Ave N.
1018[+] postal_code : 98109
1019[+] emails : ['amzn-noc-contact@amazon.com' 'aws-routing-poc@amazon.com' 'abuse@amazonaws.com']
1020[+] created : 2015-09-02
1021[+] updated : 2015-09-02
1022
1023[!] Starting DNS Enumeration...
1024
1025[+] igemar.cl. 29 IN NS pub-ns2.redtogreen.cl.
1026[+] igemar.cl. 29 IN A 52.52.234.222
1027[+] igemar.cl. 29 IN MX 0 igemar-cl.mail.protection.outlook.com.
1028[+] igemar.cl. 29 IN NS pub-ns1.redtogreen.cl.
1029[+] igemar.cl. 3599 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
1030[+] igemar.cl. 3599 IN TXT "MS=ms52251860"
1031[+] igemar.cl. 29 IN SOA pub-ns1.redtogreen.cl. pub-ns2.redtogreen.cl. 2020022701 3600 3600 1209600 30
1032
1033[-] DMARC Record Not Found!
1034
1035[!] Starting Sub-Domain Enumeration...
1036
1037[!] Requesting BuffOver
1038[!] Requesting ThreadCrowd
1039[!] Requesting crt.sh
1040[!] Requesting AnubisDB
1041[!] Requesting ThreatMiner
1042
1043[+] Results :
1044
1045[+] www.igemar.cl
1046[+] 52.52.234.222
1047
1048[+] Total Found : 2
1049
1050[+] Port : 33434
1051[+] Timeout : 1.0
1052
1053[!] Starting UDP Traceroute...
1054
1055HOPS IP HOST
1056
10571 10.203.10.1 _gateway
10582 45.131.5.2 Unknown
10593 109.236.95.226 Unknown
10604 109.236.95.106 Unknown
10615 213.248.82.108 adm-b1-link.telia.net
10626 62.115.137.64 adm-bb4-link.telia.net
10637 * * *
10648 62.115.113.20 nyk-bb2-link.telia.net
10659 62.115.119.229 sjo-b21-link.telia.net
106610 213.248.101.158 a100-ic-301289-sjo-b21.c.telia.net
106711 * * *
106812 * * *
106913 72.21.222.17 Unknown
107014 * * *
107115 * * *
107216 * * *
107317 * * *
107418 * * *
107519 * * *
107620 * * *
107721 * * *
107822 * * *
107923 * * *
108024 * * *
108125 * * *
108226 * * *
108327 * * *
108428 * * *
108529 * * *
108630 * * *
1087
1088[!] Starting Port Scan...
1089
1090[+] Testing Top 1000 Ports...
1091
1092[+] 443 https
1093[+] 80 http
1094
1095[!] Starting Crawler...
1096
1097[+] Looking for robots.txt........[ Found ]
1098[+] Extracting robots Links.......[ 1 ]
1099[+] Looking for sitemap.xml.......[ Found ]
1100[+] Extracting sitemap Links......[ 2 ]
1101[+] Extracting CSS Links..........[ 8 ]
1102[+] Extracting Javascript Links...[ 6 ]
1103[+] Extracting Internal Links.....[ 3 ]
1104[+] Extracting External Links.....[ 5 ]
1105[+] Extracting Images.............[ 27 ]
1106[+] Crawling Sitemaps.............[ 0 ]
1107[+] Crawling Javascripts..........[ 2 ]
1108
1109[+] Total Unique Links Extracted : 53
1110
1111[!] Starting Directory Search...
1112
1113[+] Threads : 50
1114[+] Timeout : 10.0
1115[+] Wordlist : wordlists/dirb_common.txt
1116[+] Allow Redirects : False
1117[+] SSL Verification : True
1118[+] DNS Servers : 1.1.1.1
1119
1120[+] 403 | https://www.igemar.cl/.config
1121[+] 403 | https://www.igemar.cl/_vti_bin/_vti_adm/admin.dll
1122[+] 403 | https://www.igemar.cl/_vti_bin/_vti_aut/author.dll
1123[+] 403 | https://www.igemar.cl/_vti_bin/shtml.dll
1124[+] 301 | https://www.igemar.cl/01
1125[+] 301 | https://www.igemar.cl/1
1126[+] 403 | https://www.igemar.cl/awstats.conf
1127[+] 302 | https://www.igemar.cl/c
1128[+] 403 | https://www.igemar.cl/development.log
1129[+] 301 | https://www.igemar.cl/en_us
1130[+] 301 | https://www.igemar.cl/en_US
1131[+] 200 | https://www.igemar.cl/es
1132[+] 200 | https://www.igemar.cl/es_ES
1133[+] 403 | https://www.igemar.cl/global.asa
1134[+] 403 | https://www.igemar.cl/global.asax
1135[+] 302 | https://www.igemar.cl/group
1136[+] 302 | https://www.igemar.cl/html
1137[+] 302 | https://www.igemar.cl/image
1138[+] 403 | https://www.igemar.cl/main.mdb
1139[+] 403 | https://www.igemar.cl/php.ini
1140[+] 403 | https://www.igemar.cl/production.log
1141[+] 200 | https://www.igemar.cl/robots.txt
1142[+] 200 | https://www.igemar.cl/sitemap.xml
1143[+] 403 | https://www.igemar.cl/spamlog.log
1144[+] 403 | https://www.igemar.cl/thumbs.db
1145[+] 403 | https://www.igemar.cl/Thumbs.db
1146[+] 302 | https://www.igemar.cl/web
1147[+] 403 | https://www.igemar.cl/web.config
1148[+] 403 | https://www.igemar.cl/WS_FTP.LOG
1149
1150[+] Directories Found : 29
1151[+] Directories Skipped : 3698
1152[+] Total Requests : 3727
1153
1154[+] Completed in 0:12:16.286094
1155#################################################################################################################################
1156[+] Starting At 2020-03-30 07:22:30.403712
1157[+] Collecting Information On: https://www.igemar.cl/
1158[#] Status: 200
1159--------------------------------------------------
1160[#] Web Server Detected: Apache-Coyote/1.1
1161[+] Xss Protection Detected !
1162- Date: Mon, 30 Mar 2020 11:22:30 GMT
1163- Server: Apache-Coyote/1.1
1164- X-Content-Type-Options: nosniff
1165- X-Frame-Options: SAMEORIGIN
1166- X-XSS-Protection: 1
1167- Content-Encoding: gzip
1168- Liferay-Portal: Liferay Community Edition Portal 7.0.2 GA3 (Wilberforce / Build 7002 / August 5, 2016)
1169- Content-Type: text/html;charset=UTF-8
1170- Set-Cookie: JSESSIONID=566232B7238BEDE7365681A595C0B94B; Path=/; Secure; HttpOnly, COOKIE_SUPPORT=true; Expires=Tue, 30-Mar-2021 11:22:30 GMT; Path=/; Secure; HttpOnly, GUEST_LANGUAGE_ID=es_ES; Domain=.igemar.cl; Expires=Tue, 30-Mar-2021 11:22:30 GMT; Path=/; Secure; HttpOnly
1171- Keep-Alive: timeout=15, max=100
1172- Connection: Keep-Alive
1173- Transfer-Encoding: chunked
1174--------------------------------------------------
1175[#] Finding Location..!
1176[#] status: success
1177[#] country: United States
1178[#] countryCode: US
1179[#] region: CA
1180[#] regionName: California
1181[#] city: San Jose
1182[#] zip: 95141
1183[#] lat: 37.3394
1184[#] lon: -121.895
1185[#] timezone: America/Los_Angeles
1186[#] isp: Amazon.com, Inc.
1187[#] org: AWS EC2 (us-west-1)
1188[#] as: AS16509 Amazon.com, Inc.
1189[#] query: 52.52.234.222
1190--------------------------------------------------
1191[x] Didn't Detect WAF Presence on: https://www.igemar.cl/
1192--------------------------------------------------
1193[#] Starting Reverse DNS
1194[!] Found 1 any Domain
1195- igemar.cl
1196--------------------------------------------------
1197[!] Scanning Open Port
1198[#] 80/tcp open http
1199[#] 443/tcp open https
1200--------------------------------------------------
1201[+] Getting SSL Info
1202{'OCSP': ('http://ocsp.sectigo.com',),
1203 'caIssuers': ('http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt',),
1204 'issuer': ((('countryName', 'GB'),),
1205 (('stateOrProvinceName', 'Greater Manchester'),),
1206 (('localityName', 'Salford'),),
1207 (('organizationName', 'Sectigo Limited'),),
1208 (('commonName',
1209 'Sectigo RSA Domain Validation Secure Server CA'),)),
1210 'notAfter': 'Apr 9 23:59:59 2021 GMT',
1211 'notBefore': 'Apr 10 00:00:00 2019 GMT',
1212 'serialNumber': 'DBD566A0E3C97906A49F3DD40503CAE1',
1213 'subject': ((('organizationalUnitName', 'Domain Control Validated'),),
1214 (('organizationalUnitName', 'COMODO SSL'),),
1215 (('commonName', 'www.igemar.cl'),)),
1216 'subjectAltName': (('DNS', 'www.igemar.cl'), ('DNS', 'igemar.cl')),
1217 'version': 3}
1218-----BEGIN CERTIFICATE-----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1254-----END CERTIFICATE-----
1255
1256--------------------------------------------------
1257[+] Collecting Information Disclosure!
1258[#] Detecting sitemap.xml file
1259[!] sitemap.xml File Found: https://www.igemar.cl//sitemap.xml
1260[#] Detecting robots.txt file
1261[!] robots.txt File Found: https://www.igemar.cl//robots.txt
1262[#] Detecting GNU Mailman
1263[-] GNU Mailman App Not Detected!?
1264--------------------------------------------------
1265[+] Crawling Url Parameter On: https://www.igemar.cl/
1266--------------------------------------------------
1267[#] Searching Html Form !
1268[+] Html Form Discovered
1269[#] action: https://www.igemar.cl/principal?p_p_id=contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8&p_p_lifecycle=1&p_p_state=normal&p_p_mode=view&p_p_col_id=_com_liferay_nested_portlets_web_portlet_NestedPortletsPortlet_INSTANCE_instcontactos__column-1&p_p_col_count=1&_contactos_portlet_ContactosPortlet_INSTANCE_3cyVGEANrBy8_javax.portlet.action=send&p_auth=roEEX8Tw
1270[#] class: None
1271[#] id: form
1272[#] method: POST
1273--------------------------------------------------
1274[!] Found 77 dom parameter
1275[#] https://www.igemar.cl
1276[#] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/aui.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=236
1277[#] https://www.igemar.cl///o/frontend-css-web/main.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=1499283982794
1278[#] https://www.igemar.cl///combo?browserId=firefox&minifierType=&themeId=igemarthemev4_WAR_igemarthemev4theme&languageId=es_ES&b=7002&com_liferay_journal_content_web_portlet_JournalContentPortlet_INSTANCE_RCbC6oSJceYR:%2Fcss%2Fmain.css&com_liferay_product_navigation_product_menu_web_portlet_ProductMenuPortlet:%2Fcss%2Fmain.css&t=1585350624000
1279[#] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/main.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=236
1280[#] https://www.igemar.cl//#main-content
1281[#] https://www.igemar.cl//#principal
1282[#] https://www.igemar.cl//#
1283[#] https://www.igemar.cl//#destacados
1284[#] https://www.igemar.cl//#quienessomos
1285[#] https://www.igemar.cl//#negocios
1286[#] https://www.igemar.cl//#gobierno
1287[#] https://www.igemar.cl//#inversionistas
1288[#] https://www.igemar.cl//#accionistas
1289[#] https://www.igemar.cl//#contactos
1290[#] https://www.igemar.cl//#destacados
1291[#] https://www.igemar.cl//#quienessomos
1292[#] https://www.igemar.cl//#negocios
1293[#] https://www.igemar.cl//#gobierno
1294[#] https://www.igemar.cl//#inversionistas
1295[#] https://www.igemar.cl//#accionistas
1296[#] https://www.igemar.cl//#contactos
1297[#] https://www.igemar.cl//#negocios
1298[#] https://www.igemar.cl//#memorias
1299[#] https://www.igemar.cl//#accionistas
1300[#] https://www.igemar.cl//#quienessomos
1301[#] https://www.igemar.cl//#quienessomos
1302[#] https://www.igemar.cl//#quienessomos
1303[#] https://www.igemar.cl//#negocios
1304[#] https://www.igemar.cl//#gobierno
1305[#] https://www.igemar.cl//#gobierno
1306[#] https://www.igemar.cl//#gobierno
1307[#] https://www.igemar.cl//#memorias
1308[#] https://www.igemar.cl//#inversionistas
1309[#] https://www.igemar.cl//#inversionistas
1310[#] https://www.igemar.cl//#contactos
1311[#] https://www.igemar.cl//#
1312[#] https://www.igemar.cl//#2019
1313[#] https://www.igemar.cl//#2018
1314[#] https://www.igemar.cl//#2017
1315[#] https://www.igemar.cl//#2016
1316[#] https://www.igemar.cl//#2015
1317[#] https://www.igemar.cl//#2014
1318[#] https://www.igemar.cl//#2013
1319[#] https://www.igemar.cl//#
1320[#] https://www.igemar.cl//#accionistas
1321[#] https://www.igemar.cl//#accionistas
1322[#] https://www.igemar.cl//#accionistas
1323[#] https://www.igemar.cl//#accionistas
1324[#] https://www.igemar.cl//#accionistas
1325[#] https://www.igemar.cl//#destacados
1326[#] https://www.igemar.cl//#negocios
1327[#] https://www.igemar.cl//#memorias
1328[#] https://www.igemar.cl//#accionistas
1329[#] https://www.igemar.cl//#quienessomos
1330[#] https://www.igemar.cl//#quienessomos
1331[#] https://www.igemar.cl//#quienessomos
1332[#] https://www.igemar.cl//#quienessomos
1333[#] https://www.igemar.cl//#negocios
1334[#] https://www.igemar.cl//#negocios
1335[#] https://www.igemar.cl//#gobierno
1336[#] https://www.igemar.cl//#gobierno
1337[#] https://www.igemar.cl//#gobierno
1338[#] https://www.igemar.cl//#gobierno
1339[#] https://www.igemar.cl//#inversionistas
1340[#] https://www.igemar.cl//#memorias
1341[#] https://www.igemar.cl//#inversionistas
1342[#] https://www.igemar.cl//#inversionistas
1343[#] https://www.igemar.cl//#contactos
1344[#] https://www.igemar.cl//#accionistas
1345[#] https://www.igemar.cl//#accionistas
1346[#] https://www.igemar.cl//#accionistas
1347[#] https://www.igemar.cl//#accionistas
1348[#] https://www.igemar.cl//#accionistas
1349[#] https://www.igemar.cl//#accionistas
1350[#] https://www.igemar.cl//#
1351[#] https://www.igemar.cl//#
1352--------------------------------------------------
1353[!] 3 Internal Dynamic Parameter Discovered
1354[+] https://www.igemar.cl///combo?browserId=firefox&minifierType=css&languageId=es_ES&b=7002&t=1499283972015&/o/product-navigation-simulation-theme-contributor/css/simulation_panel.css&/o/product-navigation-product-menu-theme-contributor/product_navigation_product_menu.css&/o/product-navigation-control-menu-theme-contributor/product_navigation_control_menu.css
1355[+] https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=es_ES
1356[+] https://www.igemar.cl/c/portal/update_language?p_l_id=34686&languageId=en_EN
1357--------------------------------------------------
1358[!] 1 External Dynamic Parameter Discovered
1359[#] https://fonts.googleapis.com/css?family=Lato:300,400,400i,700,900
1360--------------------------------------------------
1361[!] 155 Internal links Discovered
1362[+] https://www.igemar.cl/o/dynamic-data-mapping-form-renderer/css/main.css
1363[+] https://www.igemar.cl/o/mentions-web/css/mentions.css
1364[+] https://www.igemar.cl/o/igemar-theme-v-4-theme/images/favicon.ico
1365[+] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/jquery.fullPage.css
1366[+] https://www.igemar.cl/o/igemar-theme-v-4-theme/images/favicon.png
1367[+] https://www.igemar.cl///documents/34275/34693/162_igemar_estatutos_2016.pdf/73573522-5713-3312-f9d8-2b386b3860f3
1368[+] http://www.igemar.cl
1369[+] https://www.igemar.cl///documents/34275/34696/politica_libre_comp_igemar2017.pdf/24d0d534-515b-bd3a-6426-66ddc4fa0dab
1370[+] https://www.igemar.cl///documents/34275/34696/175_poli-tica-de-aportes-igemar.pdf/cd0c2d1c-c41b-a4a0-c396-6f4500b03068
1371[+] https://www.igemar.cl///documents/34275/34696/politica_gestion_riesgos_igemar.pdf/ac9567bf-0dff-39a8-0e6f-4d3205ae3c39
1372[+] https://www.igemar.cl///documents/34275/34696/Polit_prevdelitos_igemar_ago2019.pdf/c4f3201e-98ab-601f-9192-56d14939af89
1373[+] https://www.igemar.cl///documents/34275/34696/175_modelo-prevencion-igemar_dic16.pdf/0b30cb27-619d-0b59-b6e5-26b675929a56
1374[+] https://www.igemar.cl///documents/34275/34696/Codigo_etica_Igemar_agosto19.pdf/d4282dfb-db8c-ac29-b2f5-e7f693667b8c
1375[+] https://www.igemar.cl///documents/34275/34696/175_procedimientos-de-gobierno-corporativo-igemar.pdf/ace5d64c-3d86-961b-b0b0-4e6430b6aa25
1376[+] https://www.igemar.cl///documents/34275/34696/Linea_directa_Igemar_ago2019.pdf/225427b0-26c5-08a9-d7a2-226faca0e411
1377[+] https://www.igemar.cl///documents/34275/242536/EF_201903.pdf/cb2614b9-7e4b-3dee-33f3-369678f82dd5
1378[+] https://www.igemar.cl///documents/34275/242536/AR_201903.pdf/c5d826c7-a468-ced5-e876-4a932ca0ab84
1379[+] https://www.igemar.cl///documents/34275/242536/DR_201903.pdf/5a3a6a85-4c6d-265b-1106-efcd8f813b64
1380[+] https://www.igemar.cl///documents/34275/242536/HR_201903.pdf/fdd1d57b-923e-edf6-6824-167f32acc23d
1381[+] https://www.igemar.cl///documents/34275/183706/EF_91123000_201803.pdf/2fb6a33e-8dad-f817-e979-533daa6af7f7
1382[+] https://www.igemar.cl///documents/34275/183706/Estados_financieros_%28PDF%2991123000_201806.pdf/2030347b-3bfd-5fb2-22aa-fad3659620cf
1383[+] https://www.igemar.cl///documents/34275/183706/Estados_financieros_%28pdf%2991123000_201809.pdf/a3023e02-5dc9-5ea1-9eaa-1811da323d34
1384[+] https://www.igemar.cl///documents/34275/183706/EEFF_dic2018.pdf/0a8f229d-297a-04db-4b0a-f9606116f292
1385[+] https://www.igemar.cl///documents/34275/183706/AR_91123000_201803.pdf/c44b5ffd-e838-8e71-7c22-7b0d885c00ff
1386[+] https://www.igemar.cl///documents/34275/183706/An%C3%A1lisis_Razonado91123000_201806.pdf/35c5cb8c-9704-fcab-e5fb-3d345847f696
1387[+] https://www.igemar.cl///documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d
1388[+] https://www.igemar.cl///documents/34275/183706/AR_dic2018.pdf/55ae8535-ed01-6519-bb7e-67c724d37144
1389[+] https://www.igemar.cl///documents/34275/183706/DR_91123000_201803.pdf/f2020d48-73bf-1c3a-5f63-0b3266066c5c
1390[+] https://www.igemar.cl///documents/34275/183706/Declaraci%C3%B3n_de_responsabilidad91123000_201806.pdf/a44dabe7-3d36-e476-9644-4c7980528e5b
1391[+] https://www.igemar.cl///documents/34275/183706/Analisis_Razonado91123000_201809.pdf/4f377ad7-9a18-6a88-1a27-c36adca1ca8d
1392[+] https://www.igemar.cl///documents/34275/183706/DR_dic2018.pdf/7fea0c9e-348f-8d84-b4e2-1aa698294dae
1393[+] https://www.igemar.cl///documents/34275/183706/HR_91123000_201803.pdf/262adf2e-eb46-d04f-d6b0-1c3cb476f1d7
1394[+] https://www.igemar.cl///documents/34275/183706/Hechos_Relevantes91123000_201806.pdf/9027e73a-09c3-363f-4eb2-319564f75378
1395[+] https://www.igemar.cl///documents/34275/183706/Hechos_relevantes91123000_201809.pdf/f4bdbff1-7f48-bb63-ad30-e589d8ab9e7d
1396[+] https://www.igemar.cl///documents/34275/183706/HR_dic2018.pdf/99f8091d-4a2c-a3e8-653b-037e5df5a57a
1397[+] https://www.igemar.cl///documents/34275/34720/EFF0317.pdf/231e310b-2d87-fa78-320d-58da1762137a
1398[+] https://www.igemar.cl///documents/34275/126736/IFRS_201706.pdf/b4605514-e843-6756-594b-4ef660aae018
1399[+] https://www.igemar.cl///documents/34275/34720/Estados_financieros_%28PDF%2991123000_201709.pdf/7c422914-ee17-091d-f402-d058d322fc75
1400[+] https://www.igemar.cl///documents/34275/34705/Estados_financieros91123000_201712.pdf/a652e445-8218-0a67-dd4a-487c9e752466
1401[+] https://www.igemar.cl///documents/34275/34720/AR_0317.pdf/ae9b45e1-cca0-30e6-52f1-01d8cbd8ffb7
1402[+] https://www.igemar.cl///documents/34275/126736/AR_201706.pdf/091bbbef-1e2a-a0cd-890a-996a057d2ace
1403[+] https://www.igemar.cl///documents/34275/34720/An%C3%A1lisis_Razonado91123000_201709.pdf/5df24712-f409-ce76-4994-21424823e940
1404[+] https://www.igemar.cl///documents/34275/34705/Analisis_Razonado91123000_201712.pdf/882c4c22-3bfe-0ce7-3ac1-09226c215fa2
1405[+] https://www.igemar.cl///documents/34275/34720/DR0317.pdf/667adaa0-68c8-d457-c621-50670ca7650e
1406[+] https://www.igemar.cl///documents/34275/126736/DR_201706.pdf/c5aefcdd-6c86-8b60-d514-805c618b75d8
1407[+] https://www.igemar.cl///documents/34275/34720/Declaraci%C3%B3n_de_responsabilidad91123000_201709.pdf/6d38b44a-d804-a70b-badf-b7d19be7ca27
1408[+] https://www.igemar.cl///documents/34275/34705/Declaracion_de_responsabilidad91123000_201712.pdf/ec60ec62-30c5-ed79-a12c-a28b378ce84a
1409[+] https://www.igemar.cl///documents/34275/34720/HR0317.pdf/b421cc79-1ac9-193b-e224-d499b853714a
1410[+] https://www.igemar.cl///documents/34275/126736/HR_201706.pdf/e7793591-4f99-3414-9535-620b7a7667eb
1411[+] https://www.igemar.cl///documents/34275/34720/Hechos_Relevantes91123000_201709.pdf/9c70f235-b920-82c4-b392-331bcb91a6ce
1412[+] https://www.igemar.cl///documents/34275/34705/Hechos_Relevantes91123000_201712.pdf/1c8a07a5-7748-750d-def4-fa44e64813ca
1413[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201603.pdf/84553bb2-9ec4-86fa-90f7-368139f3acf1
1414[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201606.pdf/0885f4b0-a74d-dd6f-906a-b9c00e1e46c1
1415[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201609.pdf/0ffd3142-10b5-814a-4705-472b024fb660
1416[+] https://www.igemar.cl///documents/34275/34705/Igemar_eeff_2016.pdf/cd7cca3e-1dab-058c-d57a-e2283fd8bb8a
1417[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado91123000_201603.pdf/fe3df267-a7f5-7edb-bf5e-a2515905bcf8
1418[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado91123000_201606.pdf/11e6d74a-5605-2357-1500-4fc96ef6fd5e
1419[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado91123000_201609.pdf/d23594b8-1195-3054-f3a4-da16c6293939
1420[+] https://www.igemar.cl///documents/34275/34705/Igemar_AR_2016.pdf/99357c62-5fce-f212-bba4-187b04802a17
1421[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_de_responsabilidad91123000_201603.pdf/a59b5b7a-fd54-8d95-6aab-2a7cab84ab3f
1422[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_de_responsabilidad91123000_201606.pdf/d1bd918a-b3a4-ee28-a87b-b1d22f3a9d92
1423[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_de_responsabilidad91123000_201609.pdf/5f177679-f41c-fb2b-b40d-8296304e277b
1424[+] https://www.igemar.cl///documents/34275/34705/Igemar_DR_2016.pdf/e0810c51-cca5-05f0-79a5-bb6409c42e52
1425[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201603.pdf/4f5620ca-bb4c-9b83-4d56-4642048b6b42
1426[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201606.pdf/ea39bb65-4d64-cbd0-258e-ccdf9f334f22
1427[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201609.pdf/07c53b95-591a-77ca-fefc-d995bdfba1f3
1428[+] https://www.igemar.cl///documents/34275/34705/Igemar_HR_2016.pdf/70415e75-d832-ad69-9986-0bb5314bae63
1429[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201503.pdf/9400a47f-d767-b036-3e77-209138525624
1430[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_junio_2015.pdf/4b5e5630-301c-cb7c-b605-3093a3669034
1431[+] https://www.igemar.cl///documents/34275/34705/179_estados-financieros-septiembre-2015.pdf/75bec3ce-229f-f182-d69f-3470ee9d60d0
1432[+] https://www.igemar.cl///documents/34275/34705/179_eeff-diciembre-2015.pdf/4dff7d99-d5e1-18c3-2833-b73a15ce4e1a
1433[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado91123000_201503.pdf/e1fbc168-07ed-08c1-ca69-a27d9ec23314
1434[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado_junio_2015.pdf/0e448547-b6cf-f304-5904-4f430308515c
1435[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis-razonado-septiembre-2015.pdf/522c0024-5563-9a06-1064-8bd797af9c37
1436[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado-diciembre-2015.pdf/65d7b10b-4ea9-a837-3ef2-e2fe13287f05
1437[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad91123000_201503.pdf/bdc8140a-a884-3e3b-ce19-b178d6b45d6b
1438[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad_junio_2015.pdf/d9c3f090-b779-48d0-1284-dccfc0a3cdd9
1439[+] https://www.igemar.cl///documents/34275/34705/179_xb3n-responsabilidad-septiembre-2015.pdf/b71a50b7-beed-add9-9231-d7481221551a
1440[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_responsabilidad-diciembre-2015.pdf/6a83b5c8-fa3a-a4c1-8905-c2aeaf8ab7a4
1441[+] https://www.igemar.cl///documents/34275/34705/Hechos_Relevantes91123000_201503.pdf/261c32ea-ef6a-d334-5e83-4a795258016d
1442[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_junio_2015.pdf/2171c120-6482-06a1-07e1-2d65099588a5
1443[+] https://www.igemar.cl///documents/34275/34705/179_hechos-relevantes-septiembre-2015.pdf/de515067-9408-85f9-5666-f2814362c514
1444[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes-diciembre-2015.pdf/99e15269-383d-b285-b4d8-f08d6db1de12
1445[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201403.pdf/446a4b9a-bddb-a91d-8b3f-749db4eccecc
1446[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_junio_2014.pdf/a62c6a49-361a-15da-f2a5-b8a926f1c82d
1447[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_septiembre_2014.pdf/54a2748b-8672-362a-0400-bf4880d23705
1448[+] https://www.igemar.cl///documents/34275/34705/179_eeff2014.pdf/69bc8eb6-ae47-60ce-ad82-b8f9e499200d
1449[+] https://www.igemar.cl///documents/34275/34705/179_an-c3-a1lisis_razonado91123000_201403.pdf/e28f5c87-1717-7c78-393d-2de6bc271b2e
1450[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado_junio_2014.pdf/3f0ee5e9-c2da-4076-553a-a7d2eba51c56
1451[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado_septiembre_2014.pdf/9b871d1e-0f95-0838-a7a4-fe807ffd2501
1452[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado91123000_201412.pdf/1180d807-ecac-a845-39ea-6a868ea4c47b
1453[+] https://www.igemar.cl///documents/34275/34705/179_declaraci-c3-b3n_de_responsabilidad91123000_201403.pdf/7cf24895-138d-0b72-5406-85dadc3c030e
1454[+] https://www.igemar.cl///documents/34275/34705/179_declaracion_de_responsabilidad_junio_2014.pdf/e451ce99-a95e-dd0e-8cd2-12b4b5f8f715
1455[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad_septiembre_2014.pdf/ff313834-6517-aefb-84d4-90ef5daf0961
1456[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad91123000_201412.pdf/4727ab6b-16df-b7c4-bace-1d7c10331a33
1457[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201403.pdf/d89861aa-771b-df93-97b9-eb2087747581
1458[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_junio_2014.pdf/af19aa56-6ac0-2ba1-c575-c4025defd163
1459[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_septiembre_2014.pdf/173e652a-a45e-6a6a-927c-71dc94ab38da
1460[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201412.pdf/ba645dee-85c0-1baa-8d05-1d06e41e44fc
1461[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_igemar_0313.pdf/7d352aef-7c12-1798-835a-a556e10f0583
1462[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201306.pdf/c4a361c7-50b7-f3f1-a805-75e2a9269ca1
1463[+] https://www.igemar.cl///documents/34275/34705/179_estados_financieros_-pdf-91123000_201309.pdf/24e942a5-4309-8476-2c72-874bb925c902
1464[+] https://www.igemar.cl///documents/34275/34705/179_fecu2013.pdf/5855d2b8-767d-96cd-8442-c6a8f5a7cd8e
1465[+] https://www.igemar.cl///documents/34275/34705/179_analisis_razonado_igemar_0313.pdf/59c26bf9-31c1-3934-f2f5-4c5bec1b1ed1
1466[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado91123000_201306.pdf/88cc5920-eeab-205a-a0ff-98fce76f5f32
1467[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado91123000_201309.pdf/15d14ee0-5199-f543-15ad-01d9301a419e
1468[+] https://www.igemar.cl///documents/34275/34705/179_xa1lisis_razonado_diciembre_2013.pdf/a922f72d-4b77-a19f-8049-bba15d2327cc
1469[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad_igemar_0313.pdf/5737843e-896a-5fc0-a4d6-925298a7b7ee
1470[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad91123000_201306.pdf/9d751e76-f024-5628-6d91-fdf74aaa37ea
1471[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad91123000_201309.pdf/30f0d1bb-fae9-6cfd-3320-85f76c78a8fb
1472[+] https://www.igemar.cl///documents/34275/34705/179_xb3n_de_responsabilidad_diciembre_2013.pdf/4fa057e0-59a5-3f5f-ad49-1dbe6bc1a850
1473[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_igemar_0313.pdf/70cdd43d-12d3-e6c3-1762-fad64b963f7d
1474[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201306.pdf/5b7df00d-0b37-4ba4-0021-3a34b88313dc
1475[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes91123000_201309.pdf/ba8f025b-fde5-a1e5-7607-39935f2a242e
1476[+] https://www.igemar.cl///documents/34275/34705/179_hechos_relevantes_diciembre_2013.pdf/4e9d3f1a-1392-560a-4147-77f9ec3d417b
1477[+] https://www.igemar.cl///documents/34275/34699/he_271218.pdf/63043daf-1684-47bf-04d1-e5dbc6a0d0c1
1478[+] https://www.igemar.cl///documents/34275/34699/he_250418.pdf/2bf76065-ed37-8e5c-200b-69bb0de622c3
1479[+] https://www.igemar.cl///documents/34275/34699/he_06042018.pdf/9879f937-dc01-3caf-3124-e2bcd6bcb98d
1480[+] https://www.igemar.cl///documents/34275/34699/he_29032018.pdf/c6c62eb5-02f2-fd9b-9bbd-435e5920029f
1481[+] https://www.igemar.cl///documents/34275/34699/HE_igemar_170817.pdf/db81f20a-804b-dff0-241d-394c72cea636
1482[+] https://www.igemar.cl///documents/34275/34699/HE_igemar_070717.pdf/f041ffdd-23f0-8d58-dec0-8f3b1517c08a
1483[+] https://www.igemar.cl///documents/34275/34699/hes_2017060103310.pdf/bd8e8303-fa78-1bc5-b2dd-9d82d3e1812a
1484[+] https://www.igemar.cl///documents/34275/34699/H+E+Selecta.pdf/7c3fefe4-a733-c321-4e8c-d5e6000ccd43
1485[+] https://www.igemar.cl///documents/34275/34699/Hecho+Esencial+Junta+Igemar7deabril.pdf/d161a9bd-6609-ec8c-3cac-2689e54a46de
1486[+] https://www.igemar.cl///documents/34275/34699/Hecho-Esencial-08.03.2017.pdf/7adc5b06-b5b7-0f85-fd47-52406d333aa4
1487[+] https://www.igemar.cl///documents/34275/34699/180_hecho-esencial-octubre-2014.pdf/b64abc9a-5759-8b77-df03-8185002d839f
1488[+] https://www.igemar.cl///documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313
1489[+] https://www.igemar.cl///documents/34275/34708/EEFF_dic2018.pdf/b4c1b7d4-41ae-0d6b-8935-f705a21a1835
1490[+] https://www.igemar.cl///documents/34275/34708/candidatos2019_Igemar.pdf/b0b7dce7-2fc0-9920-8e0d-017a7446c672
1491[+] https://www.igemar.cl///documents/34275/34708/Fundamentos_Designacion_Auditores_Igemar.pdf/4f60033a-13ec-24e5-ff9a-3f741217f784
1492[+] https://www.igemar.cl///documents/34275/34708/Citacion_Junta2019_Igemar.pdf/8a126a9b-23bc-d68e-601c-6ae939ae3175
1493[+] https://www.igemar.cl///documents/34275/34708/Aviso_Junta2019_Igemar.pdf/2b1fe919-9572-6cf5-5e15-55fc85c19499
1494[+] https://www.igemar.cl///documents/34275/34708/Acta_Junta_Igemar_2019.pdf/f74084fc-0265-c92d-6cd0-c9acd9a8f55f
1495[+] https://www.igemar.cl///documents/34275/34708/ActaJuntaExtraordinaria2018.pdf/402fca9a-724f-5ac2-4218-aff51bd030d2
1496[+] https://www.igemar.cl///documents/34275/34708/ActaJuntaOrdinaria2018.pdf/145fe6a8-67dd-8bc3-83ad-db296dd1611f
1497[+] https://www.igemar.cl///documents/34275/34708/Acta+Junta+2017+Igemar.pdf/cd44d4c4-b7e4-253b-ab6a-d400b4424943
1498[+] https://www.igemar.cl///documents/34275/34708/206_acta_igemar_2016.pdf/151cf0db-026a-7396-c3bf-da2aeefb98f1
1499[+] https://www.igemar.cl///documents/34275/34708/197_acta-junta-igemar.pdf/3c1a510b-5618-689c-e9d2-f9196a0eacbe
1500[+] https://www.igemar.cl///documents/34275/34708/197_acta_junta2014.pdf/fc41ee7b-110b-237e-2a63-44dce010b1aa
1501[+] https://www.igemar.cl///documents/34275/34702/MemoriaAnual2018_Igemar.pdf/13c90655-35f2-3a5c-a8dc-4eb6f462b313
1502[+] https://www.igemar.cl///documents/34275/34702/memoria_igemar_2017.pdf/4bebaa66-6f29-5a96-3ebd-64ffacd76303
1503[+] https://www.igemar.cl///documents/34275/34702/Igemar_memoria_2016_SVS.pdf/3e39aced-fedf-5062-3715-30b03aef5aca
1504[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar-2015_web5.pdf/cedff9a0-9999-0481-1797-050885a9b45f
1505[+] https://www.igemar.cl///documents/34275/34702/178_memoria-20igemar-202014_web.pdf/434ee0cc-a3be-4d8f-d337-1caa97ae45bf
1506[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2013.pdf/5656d439-347b-2fe6-d6de-91e555d06cab
1507[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2012.pdf/007b9c91-afde-c41b-e921-80c6cfc457d0
1508[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2011.pdf/5949e01a-7e59-a442-2331-309007120272
1509[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2010.pdf/60c3ba85-4893-e79f-fa01-752a239e0124
1510[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2009.pdf/51ff63f9-138e-7f36-c0aa-744f2369070f
1511[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2008.pdf/8dc0a611-bd78-da92-411d-a29552d33f64
1512[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2007.pdf/11c4c3c9-daf6-ca34-4adc-ebfd3cdc79e0
1513[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2006.pdf/1c36ee28-9739-2831-2461-60c9ea2e9bda
1514[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2005.pdf/d493b7a3-7f16-a5f8-cb47-e5b97c08d606
1515[+] https://www.igemar.cl///documents/34275/34702/178_memoria_igemar_2004.pdf/77fc6db8-3785-bff6-521b-195f78cffc34
1516[+] https://www.igemar.cl//www.igemar.cl
1517--------------------------------------------------
1518[!] 12 External links Discovered
1519[#] https://www.igemar.cl
1520[#] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/aui.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=236
1521[#] https://www.igemar.cl/o/igemar-theme-v-4-theme/css/main.css?browserId=firefox&themeId=igemarthemev4_WAR_igemarthemev4theme&minifierType=css&languageId=es_ES&b=7002&t=236
1522[#] http://www.sercor.cl
1523[#] http://www.corpesca.cl
1524[#] http://www.orizon.cl/
1525[#] https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx
1526[#] http://www.sercor.cl/
1527[#] http://www.sercor.cl
1528[#] https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx
1529[#] http://www.sercor.cl
1530[#] https://www.canaldedenuncia.cl/cda/sercor/cdpages/inicio.aspx
1531--------------------------------------------------
1532[#] Mapping Subdomain..
1533[!] Found 2 Subdomain
1534- igemar.cl
1535- www.igemar.cl
1536--------------------------------------------------
1537[!] Done At 2020-03-30 07:23:07.517537
1538################################################################################################################################
1539 AVAILABLE PLUGINS
1540 -----------------
1541
1542 FallbackScsvPlugin
1543 EarlyDataPlugin
1544 OpenSslCipherSuitesPlugin
1545 SessionRenegotiationPlugin
1546 HeartbleedPlugin
1547 CertificateInfoPlugin
1548 HttpHeadersPlugin
1549 CompressionPlugin
1550 OpenSslCcsInjectionPlugin
1551 SessionResumptionPlugin
1552 RobotPlugin
1553
1554
1555
1556 CHECKING HOST(S) AVAILABILITY
1557 -----------------------------
1558
1559 52.52.234.222:443 => 52.52.234.222
1560
1561
1562
1563
1564 SCAN RESULTS FOR 52.52.234.222:443 - 52.52.234.222
1565 --------------------------------------------------
1566
1567 * Certificate Information:
1568 Content
1569 SHA1 Fingerprint: 25828887a46c79493ef52844a5892a5aa962d94a
1570 Common Name: www.siemel.cl
1571 Issuer: Sectigo RSA Domain Validation Secure Server CA
1572 Serial Number: 174753422455441198131053605908069173878
1573 Not Before: 2019-04-10 00:00:00
1574 Not After: 2021-04-09 23:59:59
1575 Signature Algorithm: sha256
1576 Public Key Algorithm: RSA
1577 Key Size: 2048
1578 Exponent: 65537 (0x10001)
1579 DNS Subject Alternative Names: ['www.siemel.cl', 'siemel.cl']
1580
1581 Trust
1582 Hostname Validation: FAILED - Certificate does NOT match 52.52.234.222
1583 Android CA Store (9.0.0_r9): OK - Certificate is trusted
1584 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
1585 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
1586 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
1587 Windows CA Store (2019-05-27): OK - Certificate is trusted
1588 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
1589 Received Chain: www.siemel.cl --> Sectigo RSA Domain Validation Secure Server CA
1590 Verified Chain: www.siemel.cl --> Sectigo RSA Domain Validation Secure Server CA --> USERTrust RSA Certification Authority
1591 Received Chain Contains Anchor: OK - Anchor certificate not sent
1592 Received Chain Order: OK - Order is valid
1593 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
1594
1595 Extensions
1596 OCSP Must-Staple: NOT SUPPORTED - Extension not found
1597 Certificate Transparency: OK - 3 SCTs included
1598
1599 OCSP Stapling
1600 NOT SUPPORTED - Server did not send back an OCSP response
1601
1602 * TLSV1_3 Cipher Suites:
1603 Server rejected all cipher suites.
1604
1605 * OpenSSL Heartbleed:
1606 OK - Not vulnerable to Heartbleed
1607
1608 * SSLV2 Cipher Suites:
1609 Server rejected all cipher suites.
1610
1611 * TLS 1.2 Session Resumption Support:
1612 With Session IDs: PARTIALLY SUPPORTED (2 successful, 3 failed, 0 errors, 5 total attempts).
1613 With TLS Tickets: NOT SUPPORTED - TLS ticket assigned but not accepted.
1614
1615 * Session Renegotiation:
1616 Client-initiated Renegotiation: OK - Rejected
1617 Secure Renegotiation: OK - Supported
1618
1619 * SSLV3 Cipher Suites:
1620 Server rejected all cipher suites.
1621
1622 * TLSV1_1 Cipher Suites:
1623 Forward Secrecy OK - Supported
1624 RC4 INSECURE - Supported
1625
1626 Preferred:
1627 None - Server followed client cipher suite preference.
1628 Accepted:
1629 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1630 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1631 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 404 Not Found
1632 TLS_RSA_WITH_IDEA_CBC_SHA 128 bits HTTP 404 Not Found
1633 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1634 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits Timeout on HTTP GET
1635 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1636 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits Timeout on HTTP GET
1637 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1638 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits Timeout on HTTP GET
1639 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1640 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1641 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits Timeout on HTTP GET
1642 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits Timeout on HTTP GET
1643 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1644 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits Timeout on HTTP GET
1645 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1646 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits Timeout on HTTP GET
1647 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1648
1649 * Deflate Compression:
1650 OK - Compression disabled
1651
1652 * TLSV1_2 Cipher Suites:
1653 Forward Secrecy OK - Supported
1654 RC4 INSECURE - Supported
1655
1656 Preferred:
1657 None - Server followed client cipher suite preference.
1658 Accepted:
1659 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1660 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1661 TLS_RSA_WITH_RC4_128_MD5 128 bits Timeout on HTTP GET
1662 TLS_RSA_WITH_IDEA_CBC_SHA 128 bits HTTP 404 Not Found
1663 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1664 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits Timeout on HTTP GET
1665 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
1666 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 404 Not Found
1667 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1668 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
1669 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
1670 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1671 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1672 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1673 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
1674 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits Timeout on HTTP GET
1675 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1676 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits Timeout on HTTP GET
1677 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
1678 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1679 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1680 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1681 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1682 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1683 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
1684 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 404 Not Found
1685 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1686 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits Timeout on HTTP GET
1687 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
1688 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1689 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1690 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1691
1692 * ROBOT Attack:
1693 OK - Not vulnerable
1694
1695 * OpenSSL CCS Injection:
1696 OK - Not vulnerable to OpenSSL CCS injection
1697
1698 * Downgrade Attacks:
1699 TLS_FALLBACK_SCSV: OK - Supported
1700
1701 * TLSV1 Cipher Suites:
1702 Forward Secrecy OK - Supported
1703 RC4 INSECURE - Supported
1704
1705 Preferred:
1706 None - Server followed client cipher suite preference.
1707 Accepted:
1708 TLS_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1709 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1710 TLS_RSA_WITH_RC4_128_MD5 128 bits HTTP 404 Not Found
1711 TLS_RSA_WITH_IDEA_CBC_SHA 128 bits HTTP 404 Not Found
1712 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 404 Not Found
1713 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1714 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1715 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1716 TLS_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1717 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits HTTP 404 Not Found
1718 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits Timeout on HTTP GET
1719 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
1720 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1721 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 404 Not Found
1722 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits Timeout on HTTP GET
1723 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 404 Not Found
1724 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
1725 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits Timeout on HTTP GET
1726 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 112 bits HTTP 404 Not Found
1727
1728
1729 SCAN COMPLETED IN 41.47 S
1730 -------------------------
1731################################################################################################################################
1732Domains still to check: 1
1733 Checking if the hostname igemar.cl. given is in fact a domain...
1734
1735Analyzing domain: igemar.cl.
1736 Checking NameServers using system default resolver...
1737 IP: 200.54.240.104 (Chile)
1738 HostName: pub-ns2.redtogreen.cl Type: NS
1739 HostName: sigma-inter2.sigma.cl Type: PTR
1740 IP: 164.77.211.200 (Chile)
1741 HostName: pub-ns1.redtogreen.cl Type: NS
1742
1743 Checking MailServers using system default resolver...
1744 IP: 104.47.70.110 (United States)
1745 HostName: igemar-cl.mail.protection.outlook.com Type: MX
1746 HostName: mail-bn7nam100110.inbound.protection.outlook.com Type: PTR
1747 IP: 104.47.55.110 (United States)
1748 HostName: igemar-cl.mail.protection.outlook.com Type: MX
1749 HostName: mail-mw2nam100110.inbound.protection.outlook.com Type: PTR
1750
1751 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1752 No zone transfer found on nameserver 164.77.211.200
1753 No zone transfer found on nameserver 200.54.240.104
1754
1755 Checking SPF record...
1756
1757 Checking SPF record...
1758 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
1759 New IP found: 40.92.0.0
1760 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
1761 New IP found: 40.107.0.0
1762 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
1763 New IP found: 52.100.0.0
1764 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
1765 New IP found: 104.47.0.0
1766 There are no IPv4 addresses in the SPF. Maybe IPv6.
1767 There are no IPv4 addresses in the SPF. Maybe IPv6.
1768
1769 Checking 192 most common hostnames using system default resolver...
1770 IP: 52.52.234.222 (United States)
1771 HostName: www.igemar.cl. Type: A
1772
1773 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1774 Checking netblock 52.100.0.0
1775 Checking netblock 164.77.211.0
1776 Checking netblock 52.52.234.0
1777 Checking netblock 104.47.70.0
1778 Checking netblock 200.54.240.0
1779 Checking netblock 104.47.0.0
1780 Checking netblock 40.107.0.0
1781 Checking netblock 104.47.55.0
1782 Checking netblock 40.92.0.0
1783
1784 Searching for igemar.cl. emails in Google
1785 gerenciageneral@igemar.cl.
1786
1787 Checking 9 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1788 Host 52.100.0.0 is down
1789 Host 164.77.211.200 is up (reset ttl 54)
1790 Host 52.52.234.222 is up (syn-ack ttl 240)
1791 Host 104.47.70.110 is up (syn-ack ttl 112)
1792 Host 200.54.240.104 is up (udp-response ttl 49)
1793 Host 104.47.0.0 is down
1794 Host 40.107.0.0 is down
1795 Host 104.47.55.110 is up (syn-ack ttl 113)
1796 Host 40.92.0.0 is down
1797
1798 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1799 Scanning ip 164.77.211.200 (pub-ns1.redtogreen.cl):
1800 53/tcp open domain syn-ack ttl 51 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1801 | dns-nsid:
1802 |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
1803 Device type: specialized|router|printer|general purpose|WAP
1804 OS Info: Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1805 Scanning ip 52.52.234.222 (www.igemar.cl.):
1806 80/tcp open http syn-ack ttl 240 Apache httpd 2.2.34
1807 | http-methods:
1808 |_ Supported Methods: GET HEAD POST OPTIONS
1809 |_http-server-header: Apache/2.2.34 (Amazon)
1810 |_http-title: Did not follow redirect to https://52.52.234.222/
1811 443/tcp open ssl/http syn-ack ttl 240 Apache Tomcat/Coyote JSP engine 1.1
1812 | http-methods:
1813 |_ Supported Methods: GET HEAD POST OPTIONS
1814 |_http-server-header: Apache-Coyote/1.1
1815 |_http-title: Estado - Sercor
1816 | ssl-cert: Subject: commonName=www.siemel.cl
1817 | Subject Alternative Name: DNS:www.siemel.cl, DNS:siemel.cl
1818 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1819 | Public Key type: rsa
1820 | Public Key bits: 2048
1821 | Signature Algorithm: sha256WithRSAEncryption
1822 | Not valid before: 2019-04-10T00:00:00
1823 | Not valid after: 2021-04-09T23:59:59
1824 | MD5: eb43 314c 77ad e4fd 6598 6473 ba7d e350
1825 |_SHA-1: 2582 8887 a46c 7949 3ef5 2844 a589 2a5a a962 d94a
1826 |_ssl-date: TLS randomness does not represent time
1827 Device type: general purpose|PBX
1828 OS Info: Service Info: Host: inversionistas.antarchile.cl
1829 Scanning ip 104.47.70.110 (mail-bn7nam100110.inbound.protection.outlook.com (PTR)):
1830 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
1831 | smtp-commands: BN7NAM10FT062.mail.protection.outlook.com Hello [45.131.5.16], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
1832 |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
1833 | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1834 | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
1835 | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
1836 | Public Key type: rsa
1837 | Public Key bits: 2048
1838 | Signature Algorithm: sha256WithRSAEncryption
1839 | Not valid before: 2020-02-24T18:33:10
1840 | Not valid after: 2022-02-24T18:33:10
1841 | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
1842 |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
1843 |_ssl-date: 2020-03-30T11:32:55+00:00; -2s from scanner time.
1844 OS Info: Service Info: Host: BN7NAM10FT004.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
1845 |_clock-skew: -2s
1846 Scanning ip 200.54.240.104 (sigma-inter2.sigma.cl (PTR)):
1847 53/tcp open domain syn-ack ttl 49 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1848 | dns-nsid:
1849 |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
1850 OS Info: Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1851 Scanning ip 104.47.55.110 (mail-mw2nam100110.inbound.protection.outlook.com (PTR)):
1852 25/tcp open smtp syn-ack ttl 115 Microsoft Exchange smtpd
1853 | smtp-commands: MW2NAM10FT018.mail.protection.outlook.com Hello [45.131.5.16], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
1854 |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
1855 | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1856 | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
1857 | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
1858 | Public Key type: rsa
1859 | Public Key bits: 2048
1860 | Signature Algorithm: sha256WithRSAEncryption
1861 | Not valid before: 2020-02-24T18:33:10
1862 | Not valid after: 2022-02-24T18:33:10
1863 | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
1864 |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
1865 |_ssl-date: 2020-03-30T11:33:58+00:00; -2s from scanner time.
1866 OS Info: Service Info: Host: MW2NAM10FT064.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
1867 |_clock-skew: -2s
1868 WebCrawling domain's web servers... up to 50 max links.
1869
1870 + URL to crawl: http://www.igemar.cl.
1871 + Date: 2020-03-30
1872
1873 + Crawling URL: http://www.igemar.cl.:
1874 + Links:
1875 + Crawling http://www.igemar.cl. (404 Not Found)
1876 + Searching for directories...
1877 + Searching open folders...
1878
1879
1880 + URL to crawl: https://www.igemar.cl.
1881 + Date: 2020-03-30
1882
1883 + Crawling URL: https://www.igemar.cl.:
1884 + Links:
1885 + Crawling https://www.igemar.cl.
1886 + Searching for directories...
1887 + Searching open folders...
1888
1889--Finished--
1890Summary information for domain igemar.cl.
1891-----------------------------------------
1892 Domain Specific Information:
1893 Email: gerenciageneral@igemar.cl.
1894
1895 Domain Ips Information:
1896 IP: 52.100.0.0
1897 Type: SPF
1898 Is Active: False
1899 IP: 164.77.211.200
1900 HostName: pub-ns1.redtogreen.cl Type: NS
1901 Country: Chile
1902 Is Active: True (reset ttl 54)
1903 Port: 53/tcp open domain syn-ack ttl 51 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1904 Script Info: | dns-nsid:
1905 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
1906 Script Info: Device type: specialized|router|printer|general purpose|WAP
1907 Os Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1908 IP: 52.52.234.222
1909 HostName: www.igemar.cl. Type: A
1910 Country: United States
1911 Is Active: True (syn-ack ttl 240)
1912 Port: 80/tcp open http syn-ack ttl 240 Apache httpd 2.2.34
1913 Script Info: | http-methods:
1914 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1915 Script Info: |_http-server-header: Apache/2.2.34 (Amazon)
1916 Script Info: |_http-title: Did not follow redirect to https://52.52.234.222/
1917 Port: 443/tcp open ssl/http syn-ack ttl 240 Apache Tomcat/Coyote JSP engine 1.1
1918 Script Info: | http-methods:
1919 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1920 Script Info: |_http-server-header: Apache-Coyote/1.1
1921 Script Info: |_http-title: Estado - Sercor
1922 Script Info: | ssl-cert: Subject: commonName=www.siemel.cl
1923 Script Info: | Subject Alternative Name: DNS:www.siemel.cl, DNS:siemel.cl
1924 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1925 Script Info: | Public Key type: rsa
1926 Script Info: | Public Key bits: 2048
1927 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1928 Script Info: | Not valid before: 2019-04-10T00:00:00
1929 Script Info: | Not valid after: 2021-04-09T23:59:59
1930 Script Info: | MD5: eb43 314c 77ad e4fd 6598 6473 ba7d e350
1931 Script Info: |_SHA-1: 2582 8887 a46c 7949 3ef5 2844 a589 2a5a a962 d94a
1932 Script Info: |_ssl-date: TLS randomness does not represent time
1933 Script Info: Device type: general purpose|PBX
1934 Os Info: Host: inversionistas.antarchile.cl
1935 IP: 104.47.70.110
1936 HostName: igemar-cl.mail.protection.outlook.com Type: MX
1937 HostName: mail-bn7nam100110.inbound.protection.outlook.com Type: PTR
1938 Country: United States
1939 Is Active: True (syn-ack ttl 112)
1940 Port: 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
1941 Script Info: | smtp-commands: BN7NAM10FT062.mail.protection.outlook.com Hello [45.131.5.16], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
1942 Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
1943 Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1944 Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
1945 Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
1946 Script Info: | Public Key type: rsa
1947 Script Info: | Public Key bits: 2048
1948 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1949 Script Info: | Not valid before: 2020-02-24T18:33:10
1950 Script Info: | Not valid after: 2022-02-24T18:33:10
1951 Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
1952 Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
1953 Script Info: |_ssl-date: 2020-03-30T11:32:55+00:00; -2s from scanner time.
1954 Os Info: Host: BN7NAM10FT004.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
1955 Script Info: |_clock-skew: -2s
1956 IP: 200.54.240.104
1957 HostName: pub-ns2.redtogreen.cl Type: NS
1958 HostName: sigma-inter2.sigma.cl Type: PTR
1959 Country: Chile
1960 Is Active: True (udp-response ttl 49)
1961 Port: 53/tcp open domain syn-ack ttl 49 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1962 Script Info: | dns-nsid:
1963 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-74.el7_6.1
1964 Os Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1965 IP: 104.47.0.0
1966 Type: SPF
1967 Is Active: False
1968 IP: 40.107.0.0
1969 Type: SPF
1970 Is Active: False
1971 IP: 104.47.55.110
1972 HostName: igemar-cl.mail.protection.outlook.com Type: MX
1973 HostName: mail-mw2nam100110.inbound.protection.outlook.com Type: PTR
1974 Country: United States
1975 Is Active: True (syn-ack ttl 113)
1976 Port: 25/tcp open smtp syn-ack ttl 115 Microsoft Exchange smtpd
1977 Script Info: | smtp-commands: MW2NAM10FT018.mail.protection.outlook.com Hello [45.131.5.16], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
1978 Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
1979 Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
1980 Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
1981 Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
1982 Script Info: | Public Key type: rsa
1983 Script Info: | Public Key bits: 2048
1984 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1985 Script Info: | Not valid before: 2020-02-24T18:33:10
1986 Script Info: | Not valid after: 2022-02-24T18:33:10
1987 Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
1988 Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
1989 Script Info: |_ssl-date: 2020-03-30T11:33:58+00:00; -2s from scanner time.
1990 Os Info: Host: MW2NAM10FT064.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
1991 Script Info: |_clock-skew: -2s
1992 IP: 40.92.0.0
1993 Type: SPF
1994 Is Active: False
1995
1996--------------End Summary --------------
1997-----------------------------------------
1998#################################################################################################################################
1999
2000----- igemar.cl -----
2001
2002
2003Host's addresses:
2004__________________
2005
2006igemar.cl. 30 IN A 52.52.234.222
2007
2008
2009Name Servers:
2010______________
2011
2012pub-ns1.redtogreen.cl. 166 IN A 164.77.211.200
2013pub-ns2.redtogreen.cl. 166 IN A 200.54.240.104
2014
2015
2016Mail (MX) Servers:
2017___________________
2018
2019igemar-cl.mail.protection.outlook.com. 10 IN A 104.47.70.110
2020igemar-cl.mail.protection.outlook.com. 10 IN A 104.47.58.110
2021
2022
2023
2024Brute forcing with /usr/share/dnsenum/dns.txt:
2025_______________________________________________
2026
2027www.igemar.cl. 30 IN A 52.52.234.222
2028
2029
2030igemar.cl class C netranges:
2031_____________________________
2032
2033 52.52.234.0/24
2034 ################################################################################################################################
2035Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:51 EDT
2036NSE: Loaded 151 scripts for scanning.
2037NSE: Script Pre-scanning.
2038Initiating NSE at 07:51
2039Completed NSE at 07:51, 0.00s elapsed
2040Initiating NSE at 07:51
2041Completed NSE at 07:51, 0.00s elapsed
2042Initiating NSE at 07:51
2043Completed NSE at 07:51, 0.00s elapsed
2044Initiating Ping Scan at 07:51
2045Scanning 52.52.234.222 [4 ports]
2046Completed Ping Scan at 07:51, 0.29s elapsed (1 total hosts)
2047Initiating Parallel DNS resolution of 1 host. at 07:51
2048Completed Parallel DNS resolution of 1 host. at 07:51, 0.02s elapsed
2049Initiating SYN Stealth Scan at 07:51
2050Scanning ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222) [1000 ports]
2051Discovered open port 443/tcp on 52.52.234.222
2052Discovered open port 80/tcp on 52.52.234.222
2053Completed SYN Stealth Scan at 07:51, 14.41s elapsed (1000 total ports)
2054Initiating Service scan at 07:51
2055Scanning 2 services on ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2056Completed Service scan at 07:51, 13.72s elapsed (2 services on 1 host)
2057Initiating OS detection (try #1) against ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2058Retrying OS detection (try #2) against ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2059Initiating Traceroute at 07:51
2060Completed Traceroute at 07:51, 6.05s elapsed
2061Initiating Parallel DNS resolution of 9 hosts. at 07:51
2062Completed Parallel DNS resolution of 9 hosts. at 07:51, 5.52s elapsed
2063NSE: Script scanning 52.52.234.222.
2064Initiating NSE at 07:51
2065Completed NSE at 07:52, 10.29s elapsed
2066Initiating NSE at 07:52
2067Completed NSE at 07:52, 2.42s elapsed
2068Initiating NSE at 07:52
2069Completed NSE at 07:52, 0.00s elapsed
2070Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2071Host is up (0.26s latency).
2072Not shown: 998 filtered ports
2073PORT STATE SERVICE VERSION
207480/tcp open http Apache httpd 2.2.34
2075| http-methods:
2076|_ Supported Methods: GET HEAD POST OPTIONS
2077|_http-server-header: Apache/2.2.34 (Amazon)
2078|_http-title: Did not follow redirect to https://ec2-52-52-234-222.us-west-1.compute.amazonaws.com/
2079443/tcp open ssl/http Apache Tomcat/Coyote JSP engine 1.1
2080| http-methods:
2081| Supported Methods: GET HEAD POST TRACE OPTIONS
2082|_ Potentially risky methods: TRACE
2083|_http-server-header: Apache-Coyote/1.1
2084|_http-title: Estado - Sercor
2085| ssl-cert: Subject: commonName=www.siemel.cl
2086| Subject Alternative Name: DNS:www.siemel.cl, DNS:siemel.cl
2087| Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
2088| Public Key type: rsa
2089| Public Key bits: 2048
2090| Signature Algorithm: sha256WithRSAEncryption
2091| Not valid before: 2019-04-10T00:00:00
2092| Not valid after: 2021-04-09T23:59:59
2093| MD5: eb43 314c 77ad e4fd 6598 6473 ba7d e350
2094|_SHA-1: 2582 8887 a46c 7949 3ef5 2844 a589 2a5a a962 d94a
2095|_ssl-date: TLS randomness does not represent time
2096Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2097Device type: general purpose|PBX
2098Running (JUST GUESSING): Linux 3.X (88%), Vodavi embedded (87%)
2099OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/h:vodavi:xts-ip
2100Aggressive OS guesses: Linux 3.10 - 3.13 (88%), Vodavi XTS-IP PBX (87%)
2101No exact OS matches for host (test conditions non-ideal).
2102Uptime guess: 3.805 days (since Thu Mar 26 12:32:09 2020)
2103Network Distance: 20 hops
2104TCP Sequence Prediction: Difficulty=258 (Good luck!)
2105IP ID Sequence Generation: All zeros
2106Service Info: Host: inversionistas.antarchile.cl
2107
2108TRACEROUTE (using port 443/tcp)
2109HOP RTT ADDRESS
21101 100.46 ms 10.203.10.1
21112 100.75 ms 45.131.5.2
21123 100.51 ms 109.236.95.228
21134 101.50 ms 109.236.95.167
21145 102.14 ms adm-b1-link.telia.net (213.248.90.198)
21156 265.46 ms adm-bb3-link.telia.net (62.115.116.124)
21167 ... 8
21179 249.59 ms sjo-b21-link.telia.net (213.155.130.129)
211810 244.59 ms a100-ic-301289-sjo-b21.c.telia.net (213.248.101.158)
211911 ... 19
212020 244.16 ms ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2121
2122NSE: Script Post-scanning.
2123Initiating NSE at 07:52
2124Completed NSE at 07:52, 0.00s elapsed
2125Initiating NSE at 07:52
2126Completed NSE at 07:52, 0.00s elapsed
2127Initiating NSE at 07:52
2128Completed NSE at 07:52, 0.00s elapsed
2129################################################################################################################################
2130Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:29 EDT
2131Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2132Host is up (0.25s latency).
2133Not shown: 474 filtered ports
2134Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2135PORT STATE SERVICE VERSION
213680/tcp open http Apache httpd 2.2.34
2137|_http-server-header: Apache/2.2.34 (Amazon)
2138|_http-title: Did not follow redirect to https://ec2-52-52-234-222.us-west-1.compute.amazonaws.com/
2139443/tcp open ssl/http Apache Tomcat/Coyote JSP engine 1.1
2140| http-methods:
2141|_ Potentially risky methods: TRACE
2142|_http-server-header: Apache-Coyote/1.1
2143|_http-title: Estado - Sercor
2144| ssl-cert: Subject: commonName=www.siemel.cl
2145| Subject Alternative Name: DNS:www.siemel.cl, DNS:siemel.cl
2146| Not valid before: 2019-04-10T00:00:00
2147|_Not valid after: 2021-04-09T23:59:59
2148|_ssl-date: TLS randomness does not represent time
2149Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2150Device type: PBX|general purpose
2151Running (JUST GUESSING): Vodavi embedded (87%), Linux 3.X (86%)
2152OS CPE: cpe:/h:vodavi:xts-ip cpe:/o:linux:linux_kernel:3
2153Aggressive OS guesses: Vodavi XTS-IP PBX (87%), Linux 3.10 - 3.13 (86%)
2154No exact OS matches for host (test conditions non-ideal).
2155Network Distance: 20 hops
2156Service Info: Host: inversionistas.antarchile.cl
2157
2158TRACEROUTE (using port 80/tcp)
2159HOP RTT ADDRESS
21601 100.49 ms 10.203.10.1
21612 183.62 ms 45.131.5.2
21623 100.66 ms 109.236.95.228
21634 101.66 ms 109.236.95.167
21645 102.30 ms adm-b1-link.telia.net (213.248.82.108)
21656 265.57 ms adm-bb3-link.telia.net (62.115.116.124)
21667 253.91 ms ldn-bb3-link.telia.net (213.155.136.98)
21678 266.31 ms hbg-bb3-link.telia.net (80.91.249.11)
21689 263.12 ms kbn-bb3-link.telia.net (213.155.130.101)
216910 ... 11
217012 261.12 ms a100row-ic-300117-sjo-b21.c.telia.net (213.248.87.118)
217113 257.84 ms 205.251.229.158
217214 ... 19
217320 253.99 ms ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2174#################################################################################################################################
2175Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:30 EDT
2176Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2177Host is up.
2178Not shown: 14 filtered ports
2179Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2180PORT STATE SERVICE VERSION
218153/udp open|filtered domain
218267/udp open|filtered dhcps
218368/udp open|filtered dhcpc
218469/udp open|filtered tftp
218588/udp open|filtered kerberos-sec
2186123/udp open|filtered ntp
2187137/udp open|filtered netbios-ns
2188138/udp open|filtered netbios-dgm
2189139/udp open|filtered netbios-ssn
2190161/udp open|filtered snmp
2191162/udp open|filtered snmptrap
2192389/udp open|filtered ldap
2193520/udp open|filtered route
21942049/udp open|filtered nfs
2195Too many fingerprints match this host to give specific OS details
2196
2197TRACEROUTE (using proto 1/icmp)
2198HOP RTT ADDRESS
21991 103.09 ms 10.203.10.1
22002 103.27 ms 45.131.5.3
22013 103.26 ms 109.236.95.230
22024 104.46 ms 109.236.95.167
22035 104.71 ms adm-b1-link.telia.net (213.248.99.194)
22046 268.42 ms adm-bb3-link.telia.net (62.115.116.124)
22057 253.00 ms ldn-bb3-link.telia.net (62.115.113.211)
22068 248.77 ms nyk-bb2-link.telia.net (62.115.113.20)
22079 249.38 ms sjo-b21-link.telia.net (62.115.119.229)
220810 251.57 ms a100-ic-301289-sjo-b21.c.telia.net (213.248.101.158)
220911 ... 30
2210################################################################################################################################
2211Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:35 EDT
2212Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2213Host is up.
2214
2215PORT STATE SERVICE VERSION
221667/tcp filtered dhcps
221767/udp open|filtered dhcps
2218|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
2219Too many fingerprints match this host to give specific OS details
2220
2221TRACEROUTE (using proto 1/icmp)
2222HOP RTT ADDRESS
22231 100.07 ms 10.203.10.1
22242 100.24 ms 45.131.5.3
22253 100.22 ms 109.236.95.230
22264 101.25 ms 109.236.95.167
22275 101.63 ms adm-b1-link.telia.net (213.248.99.194)
22286 265.06 ms adm-bb3-link.telia.net (62.115.116.124)
22297 254.65 ms ldn-bb3-link.telia.net (62.115.113.211)
22308 ...
22319 249.41 ms sjo-b21-link.telia.net (62.115.119.229)
223210 249.22 ms a100-ic-301289-sjo-b21.c.telia.net (213.248.101.158)
223311 ... 30
2234###############################################################################################################################
2235Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:37 EDT
2236Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2237Host is up.
2238
2239PORT STATE SERVICE VERSION
224068/tcp filtered dhcpc
224168/udp open|filtered dhcpc
2242Too many fingerprints match this host to give specific OS details
2243
2244TRACEROUTE (using proto 1/icmp)
2245HOP RTT ADDRESS
22461 104.60 ms 10.203.10.1
22472 104.96 ms 45.131.5.3
22483 104.78 ms 109.236.95.230
22494 105.74 ms 109.236.95.167
22505 106.14 ms adm-b1-link.telia.net (213.248.99.194)
22516 270.27 ms adm-bb3-link.telia.net (62.115.116.124)
22527 258.45 ms ldn-bb3-link.telia.net (62.115.113.211)
22538 ...
22549 250.27 ms sjo-b21-link.telia.net (62.115.119.229)
225510 249.86 ms a100-ic-301289-sjo-b21.c.telia.net (213.248.101.158)
225611 ... 30
2257#################################################################################################################################
2258Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:39 EDT
2259Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2260Host is up.
2261
2262PORT STATE SERVICE VERSION
226369/tcp filtered tftp
226469/udp open|filtered tftp
2265Too many fingerprints match this host to give specific OS details
2266
2267TRACEROUTE (using proto 1/icmp)
2268HOP RTT ADDRESS
22691 103.93 ms 10.203.10.1
22702 104.17 ms 45.131.5.3
22713 104.18 ms 109.236.95.230
22724 105.15 ms 109.236.95.167
22735 101.83 ms adm-b1-link.telia.net (213.248.99.194)
22746 265.03 ms adm-bb3-link.telia.net (62.115.116.124)
22757 253.66 ms ldn-bb3-link.telia.net (62.115.113.211)
22768 ...
22779 249.43 ms sjo-b21-link.telia.net (62.115.119.229)
227810 249.05 ms a100-ic-301289-sjo-b21.c.telia.net (213.248.101.158)
227911 ... 30
2280################################################################################################################################
2281http://52.52.234.222 [302 Found] Apache[2.2.34], Country[UNITED STATES][US], HTTPServer[Apache/2.2.34 (Amazon)], IP[52.52.234.222], RedirectLocation[https://52.52.234.222/], Title[302 Found]
2282https://52.52.234.222/ [404 Not Found] Apache, Cookies[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], Country[UNITED STATES][US], HTML5, HTTPServer[Apache-Coyote/1.1], HttpOnly[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], IP[52.52.234.222], Java, Liferay, Script[text/javascript], Title[Estado - Sercor], UncommonHeaders[x-content-type-options,liferay-portal], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1]
2283#################################################################################################################################
2284HTTP/1.1 302 Found
2285Date: Mon, 30 Mar 2020 11:42:10 GMT
2286Server: Apache/2.2.34 (Amazon)
2287Location: https://52.52.234.222/
2288Connection: close
2289Content-Type: text/html; charset=iso-8859-1
2290
2291HTTP/1.1 302 Found
2292Date: Mon, 30 Mar 2020 11:42:11 GMT
2293Server: Apache/2.2.34 (Amazon)
2294Location: https://52.52.234.222/
2295Connection: close
2296Content-Type: text/html; charset=iso-8859-1
2297################################################################################################################################
2298Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:42 EDT
2299Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2300Host is up.
2301
2302PORT STATE SERVICE VERSION
2303123/tcp filtered ntp
2304123/udp open|filtered ntp
2305Too many fingerprints match this host to give specific OS details
2306
2307TRACEROUTE (using proto 1/icmp)
2308HOP RTT ADDRESS
23091 105.00 ms 10.203.10.1
23102 105.27 ms 45.131.5.3
23113 105.03 ms 109.236.95.230
23124 103.28 ms 109.236.95.167
23135 103.31 ms adm-b1-link.telia.net (213.248.99.194)
23146 265.90 ms adm-bb3-link.telia.net (62.115.116.124)
23157 254.72 ms ldn-bb3-link.telia.net (62.115.113.211)
23168 ...
23179 250.96 ms sjo-b21-link.telia.net (62.115.119.229)
231810 250.96 ms a100-ic-301289-sjo-b21.c.telia.net (213.248.101.158)
231911 ... 30
2320################################################################################################################################
2321https://52.52.234.222/ [404 Not Found] Apache, Cookies[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], Country[UNITED STATES][US], HTML5, HTTPServer[Apache-Coyote/1.1], HttpOnly[COOKIE_SUPPORT,GUEST_LANGUAGE_ID,JSESSIONID], IP[52.52.234.222], Java, Liferay, Script[text/javascript], Title[Estado - Sercor], UncommonHeaders[x-content-type-options,liferay-portal], X-Frame-Options[SAMEORIGIN], X-XSS-Protection[1]
2322#################################################################################################################################
2323Version: 2.0.0-static
2324OpenSSL 1.1.1f-dev xx XXX xxxx
2325
2326Connected to 52.52.234.222
2327
2328Testing SSL server 52.52.234.222 on port 443 using SNI name 52.52.234.222
2329
2330 SSL/TLS Protocols:
2331SSLv2 disabled
2332SSLv3 disabled
2333TLSv1.0 enabled
2334TLSv1.1 enabled
2335TLSv1.2 enabled
2336TLSv1.3 disabled
2337
2338 TLS Fallback SCSV:
2339Server supports TLS Fallback SCSV
2340
2341 TLS renegotiation:
2342Secure session renegotiation supported
2343
2344 TLS Compression:
2345Compression disabled
2346
2347 Heartbleed:
2348TLSv1.2 not vulnerable to heartbleed
2349TLSv1.1 not vulnerable to heartbleed
2350TLSv1.0 not vulnerable to heartbleed
2351
2352 Supported Server Cipher(s):
2353Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
2354Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
2355Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
2356Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
2357Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
2358Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
2359Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
2360Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
2361Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2362Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
2363Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
2364Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2365Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
2366Accepted TLSv1.2 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
2367Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
2368Accepted TLSv1.2 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
2369Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
2370Accepted TLSv1.2 112 bits DHE-RSA-DES-CBC3-SHA DHE 2048 bits
2371Accepted TLSv1.2 256 bits AES256-GCM-SHA384
2372Accepted TLSv1.2 128 bits AES128-GCM-SHA256
2373Accepted TLSv1.2 256 bits AES256-SHA256
2374Accepted TLSv1.2 128 bits AES128-SHA256
2375Accepted TLSv1.2 256 bits AES256-SHA
2376Accepted TLSv1.2 256 bits CAMELLIA256-SHA
2377Accepted TLSv1.2 128 bits AES128-SHA
2378Accepted TLSv1.2 128 bits SEED-SHA
2379Accepted TLSv1.2 128 bits CAMELLIA128-SHA
2380Accepted TLSv1.2 128 bits RC4-SHA
2381Accepted TLSv1.2 128 bits RC4-MD5
2382Accepted TLSv1.2 112 bits DES-CBC3-SHA
2383Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2384Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
2385Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
2386Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2387Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
2388Accepted TLSv1.1 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
2389Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
2390Accepted TLSv1.1 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
2391Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
2392Accepted TLSv1.1 112 bits DHE-RSA-DES-CBC3-SHA DHE 2048 bits
2393Accepted TLSv1.1 256 bits AES256-SHA
2394Accepted TLSv1.1 256 bits CAMELLIA256-SHA
2395Accepted TLSv1.1 128 bits AES128-SHA
2396Accepted TLSv1.1 128 bits SEED-SHA
2397Accepted TLSv1.1 128 bits CAMELLIA128-SHA
2398Accepted TLSv1.1 128 bits IDEA-CBC-SHA
2399Accepted TLSv1.1 128 bits RC4-SHA
2400Accepted TLSv1.1 128 bits RC4-MD5
2401Accepted TLSv1.1 112 bits DES-CBC3-SHA
2402Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
2403Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
2404Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 2048 bits
2405Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
2406Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
2407Accepted TLSv1.0 128 bits DHE-RSA-SEED-SHA DHE 2048 bits
2408Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 2048 bits
2409Accepted TLSv1.0 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
2410Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
2411Accepted TLSv1.0 112 bits DHE-RSA-DES-CBC3-SHA DHE 2048 bits
2412Accepted TLSv1.0 256 bits AES256-SHA
2413Accepted TLSv1.0 256 bits CAMELLIA256-SHA
2414Accepted TLSv1.0 128 bits AES128-SHA
2415Accepted TLSv1.0 128 bits SEED-SHA
2416Accepted TLSv1.0 128 bits CAMELLIA128-SHA
2417Accepted TLSv1.0 128 bits IDEA-CBC-SHA
2418Accepted TLSv1.0 128 bits RC4-SHA
2419Accepted TLSv1.0 128 bits RC4-MD5
2420Accepted TLSv1.0 112 bits DES-CBC3-SHA
2421
2422 Server Key Exchange Group(s):
2423TLSv1.2 128 bits secp256k1
2424TLSv1.2 128 bits secp256r1 (NIST P-256)
2425TLSv1.2 192 bits secp384r1 (NIST P-384)
2426TLSv1.2 260 bits secp521r1 (NIST P-521)
2427
2428 Server Signature Algorithm(s):
2429TLSv1.2 rsa_pkcs1_sha1
2430TLSv1.2 dsa_sha1
2431TLSv1.2 ecdsa_sha1
2432TLSv1.2 rsa_pkcs1_sha224
2433TLSv1.2 dsa_sha224
2434TLSv1.2 ecdsa_sha224
2435TLSv1.2 rsa_pkcs1_sha256
2436TLSv1.2 dsa_sha256
2437TLSv1.2 ecdsa_secp256r1_sha256
2438TLSv1.2 rsa_pkcs1_sha384
2439TLSv1.2 dsa_sha384
2440TLSv1.2 ecdsa_secp384r1_sha384
2441TLSv1.2 rsa_pkcs1_sha512
2442TLSv1.2 dsa_sha512
2443TLSv1.2 ecdsa_secp521r1_sha512
2444
2445 SSL Certificate:
2446Signature Algorithm: sha256WithRSAEncryption
2447RSA Key Strength: 2048
2448
2449Subject: www.siemel.cl
2450Altnames: DNS:www.siemel.cl, DNS:siemel.cl
2451Issuer: Sectigo RSA Domain Validation Secure Server CA
2452
2453Not valid before: Apr 10 00:00:00 2019 GMT
2454Not valid after: Apr 9 23:59:59 2021 GMT
2455#################################################################################################################################
2456Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:48 EDT
2457Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2458Host is up (0.26s latency).
2459Not shown: 65533 filtered ports
2460PORT STATE SERVICE VERSION
246180/tcp open http Apache httpd 2.2.34
2462|_http-server-header: Apache/2.2.34 (Amazon)
2463|_http-title: Did not follow redirect to https://ec2-52-52-234-222.us-west-1.compute.amazonaws.com/
2464443/tcp open ssl/http Apache Tomcat/Coyote JSP engine 1.1
2465| http-methods:
2466|_ Potentially risky methods: TRACE
2467|_http-server-header: Apache-Coyote/1.1
2468|_http-title: Estado - Sercor
2469| ssl-cert: Subject: commonName=www.siemel.cl
2470| Subject Alternative Name: DNS:www.siemel.cl, DNS:siemel.cl
2471| Not valid before: 2019-04-10T00:00:00
2472|_Not valid after: 2021-04-09T23:59:59
2473|_ssl-date: TLS randomness does not represent time
2474Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2475Device type: PBX|general purpose
2476Running (JUST GUESSING): Vodavi embedded (87%), Linux 3.X (86%)
2477OS CPE: cpe:/h:vodavi:xts-ip cpe:/o:linux:linux_kernel:3
2478Aggressive OS guesses: Vodavi XTS-IP PBX (87%), Linux 3.10 - 3.13 (86%)
2479No exact OS matches for host (test conditions non-ideal).
2480Network Distance: 20 hops
2481Service Info: Host: inversionistas.antarchile.cl
2482
2483TRACEROUTE (using port 80/tcp)
2484HOP RTT ADDRESS
24851 99.81 ms 10.203.10.1
24862 99.83 ms 45.131.5.3
24873 99.94 ms 109.236.95.226
24884 100.89 ms 109.236.95.167
24895 101.10 ms adm-b1-link.telia.net (62.115.166.142)
24906 265.85 ms adm-bb3-link.telia.net (62.115.116.124)
24917 253.02 ms ldn-bb3-link.telia.net (213.155.136.98)
24928 ...
24939 248.82 ms sjo-b21-link.telia.net (62.115.119.229)
249410 248.50 ms a100row-ic-300117-sjo-b21.c.telia.net (213.248.87.118)
249511 ... 12
249613 272.67 ms a100-ic-301289-sjo-b21.c.telia.net (213.248.101.158)
249714 ... 19
249820 254.54 ms ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2499#################################################################################################################################
2500Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:54 EDT
2501Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2502Host is up.
2503
2504PORT STATE SERVICE VERSION
250553/tcp filtered domain
250667/tcp filtered dhcps
250768/tcp filtered dhcpc
250869/tcp filtered tftp
250988/tcp filtered kerberos-sec
2510123/tcp filtered ntp
2511137/tcp filtered netbios-ns
2512138/tcp filtered netbios-dgm
2513139/tcp filtered netbios-ssn
2514161/tcp filtered snmp
2515162/tcp filtered snmptrap
2516389/tcp filtered ldap
2517520/tcp filtered efs
25182049/tcp filtered nfs
251953/udp open|filtered domain
252067/udp open|filtered dhcps
252168/udp open|filtered dhcpc
252269/udp open|filtered tftp
252388/udp open|filtered kerberos-sec
2524123/udp open|filtered ntp
2525137/udp open|filtered netbios-ns
2526138/udp open|filtered netbios-dgm
2527139/udp open|filtered netbios-ssn
2528161/udp open|filtered snmp
2529162/udp open|filtered snmptrap
2530389/udp open|filtered ldap
2531520/udp open|filtered route
25322049/udp open|filtered nfs
2533Too many fingerprints match this host to give specific OS details
2534
2535TRACEROUTE (using proto 1/icmp)
2536HOP RTT ADDRESS
25371 104.81 ms 10.203.10.1
25382 104.89 ms 45.131.5.3
25393 104.88 ms 109.236.95.230
25404 106.60 ms 109.236.95.167
25415 106.65 ms adm-b1-link.telia.net (213.248.99.194)
25426 270.83 ms adm-bb3-link.telia.net (62.115.116.124)
25437 255.29 ms ldn-bb3-link.telia.net (62.115.113.211)
25448 ...
25459 250.29 ms sjo-b21-link.telia.net (62.115.119.229)
254610 251.32 ms a100-ic-301289-sjo-b21.c.telia.net (213.248.101.158)
254711 ... 30
2548#################################################################################################################################
2549Hosts
2550=====
2551
2552address mac name os_name os_flavor os_sp purpose info comments
2553------- --- ---- ------- --------- ----- ------- ---- --------
255452.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com embedded device
255593.174.93.84 Linux 3.X server
2556#################################################################################################################################
2557Services
2558========
2559
2560host port proto name state info
2561---- ---- ----- ---- ----- ----
256252.52.234.222 53 tcp domain filtered
256352.52.234.222 53 udp domain unknown
256452.52.234.222 67 tcp dhcps filtered
256552.52.234.222 67 udp dhcps unknown
256652.52.234.222 68 tcp dhcpc filtered
256752.52.234.222 68 udp dhcpc unknown
256852.52.234.222 69 tcp tftp filtered
256952.52.234.222 69 udp tftp unknown
257052.52.234.222 80 tcp http open Apache httpd 2.2.34
257152.52.234.222 88 tcp kerberos-sec filtered
257252.52.234.222 88 udp kerberos-sec unknown
257352.52.234.222 123 tcp ntp filtered
257452.52.234.222 123 udp ntp unknown
257552.52.234.222 137 tcp netbios-ns filtered
257652.52.234.222 137 udp netbios-ns unknown
257752.52.234.222 138 tcp netbios-dgm filtered
257852.52.234.222 138 udp netbios-dgm unknown
257952.52.234.222 139 tcp netbios-ssn filtered
258052.52.234.222 139 udp netbios-ssn unknown
258152.52.234.222 161 tcp snmp filtered
258252.52.234.222 161 udp snmp unknown
258352.52.234.222 162 tcp snmptrap filtered
258452.52.234.222 162 udp snmptrap unknown
258552.52.234.222 389 tcp ldap filtered
258652.52.234.222 389 udp ldap unknown
258752.52.234.222 443 tcp ssl/http open Apache Tomcat/Coyote JSP engine 1.1
258852.52.234.222 520 tcp efs filtered
258952.52.234.222 520 udp route unknown
259052.52.234.222 2049 tcp nfs filtered
259152.52.234.222 2049 udp nfs unknown
259293.174.93.84 53 tcp domain filtered
259393.174.93.84 53 udp domain unknown
259493.174.93.84 67 tcp dhcps filtered
259593.174.93.84 67 udp dhcps unknown
259693.174.93.84 68 tcp dhcpc filtered
259793.174.93.84 68 udp dhcpc unknown
259893.174.93.84 69 tcp tftp filtered
259993.174.93.84 69 udp tftp unknown
260093.174.93.84 80 tcp http open Apache httpd 2.4.6 (CentOS) PHP/5.4.16
260193.174.93.84 88 tcp kerberos-sec filtered
260293.174.93.84 88 udp kerberos-sec unknown
260393.174.93.84 123 tcp ntp filtered
260493.174.93.84 123 udp ntp filtered
260593.174.93.84 137 tcp netbios-ns filtered
260693.174.93.84 137 udp netbios-ns unknown
260793.174.93.84 138 tcp netbios-dgm filtered
260893.174.93.84 138 udp netbios-dgm filtered
260993.174.93.84 139 tcp netbios-ssn filtered
261093.174.93.84 139 udp netbios-ssn filtered
261193.174.93.84 161 tcp snmp filtered
261293.174.93.84 161 udp snmp unknown
261393.174.93.84 162 tcp snmptrap filtered
261493.174.93.84 162 udp snmptrap filtered
261593.174.93.84 389 tcp ldap filtered
261693.174.93.84 389 udp ldap unknown
261793.174.93.84 520 tcp efs filtered
261893.174.93.84 520 udp route unknown
261993.174.93.84 2049 tcp nfs filtered
262093.174.93.84 2049 udp nfs unknown
262193.174.93.84 3030 tcp http-proxy open tinyproxy 1.8.3
2622################################################################################################################################
2623Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-30 07:28 EDT
2624Nmap scan report for ec2-52-52-234-222.us-west-1.compute.amazonaws.com (52.52.234.222)
2625Host is up (0.26s latency).
2626Not shown: 998 filtered ports
2627PORT STATE SERVICE VERSION
262880/tcp open http Apache httpd 2.2.34
2629|_http-server-header: Apache/2.2.34 (Amazon)
2630| vulscan: VulDB - https://vuldb.com:
2631| [106777] Apache HTTP Server up to 2.2.34/2.4.27 Limit Directive ap_limit_section HTTP Request information disclosure
2632| [134248] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
2633| [134247] Apache Archiva up to 2.2.3 Artifact Upload directory traversal
2634| [122889] Apache HTTP Server up to 2.2.31/2.4.23 mod_userdir HTTP Response Splitting privilege escalation
2635| [103520] Apache HTTP Server up to 2.2.33/2.4.26 mod_auth_digest Authorization Header memory corruption
2636| [102698] Apache HTTP Server up to 2.2.32/2.4.25 mod_mime Content-Type memory corruption
2637| [102690] Apache HTTP Server up to 2.2.32/2.4.25 mod_ssl ap_hook_process_connection() denial of service
2638| [102689] Apache HTTP Server up to 2.2.32/2.4.25 ap_get_basic_auth_pw weak authentication
2639| [12291] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
2640| [64485] Apache Struts up to 2.2.3.0 privilege escalation
2641| [64457] Apache Struts up to 2.2.3.0 cross site scripting
2642| [60352] Apache Struts up to 2.2.3 memory corruption
2643| [59902] Apache Struts up to 2.2.3 Interfaces unknown vulnerability
2644| [4528] Apache Struts up to 2.2.3 DebuggingInterceptor privilege escalation
2645| [4527] Apache Struts up to 2.2.3 ExceptionDelegator cross site scripting
2646| [4512] Apache Struts up to 2.2.3 CookieInterceptor privilege escalation
2647|
2648| MITRE CVE - https://cve.mitre.org:
2649| [CVE-2012-1006] Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders.
2650| [CVE-2012-0838] Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
2651| [CVE-2012-0391] The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
2652| [CVE-2011-2087] Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java.
2653| [CVE-2011-1772] Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element.
2654| [CVE-2007-1743] suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
2655| [CVE-2007-1742] suexec in Apache HTTP Server (httpd) 2.2.3 uses a partial comparison for verifying whether the current directory is within the document root, which might allow local users to perform unauthorized operations on incorrect directories, as demonstrated using "html_backup" and "htmleditor" under an "html" directory. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
2656| [CVE-2007-1741] Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
2657| [CVE-2013-1896] mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
2658| [CVE-2013-1862] mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
2659| [CVE-2013-1768] The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
2660| [CVE-2013-1048] The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
2661| [CVE-2012-4558] Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
2662| [CVE-2012-4557] The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
2663| [CVE-2012-3499] Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
2664| [CVE-2012-0216] The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
2665| [CVE-2012-0053] protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
2666| [CVE-2012-0031] scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
2667| [CVE-2012-0021] The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
2668| [CVE-2011-5034] Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
2669| [CVE-2011-4668] IBM Tivoli Netcool/Reporter 2.2 before 2.2.0.8 allows remote attackers to execute arbitrary code via vectors related to an unspecified CGI program used with the Apache HTTP Server.
2670| [CVE-2011-4415] The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607.
2671| [CVE-2011-4317] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
2672| [CVE-2011-3639] The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
2673| [CVE-2011-3607] Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
2674| [CVE-2011-3368] The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
2675| [CVE-2011-3348] The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
2676| [CVE-2011-3192] The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
2677| [CVE-2011-2088] XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
2678| [CVE-2011-1928] The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
2679| [CVE-2011-1176] The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
2680| [CVE-2011-0419] Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
2681| [CVE-2010-4476] The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
2682| [CVE-2010-2791] mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
2683| [CVE-2010-2076] Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to samples/wsdl_first_pure_xml, a similar issue to CVE-2010-1632.
2684| [CVE-2010-2068] mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
2685| [CVE-2010-1452] The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
2686| [CVE-2010-0434] The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
2687| [CVE-2010-0425] modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
2688| [CVE-2010-0408] The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
2689| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
2690| [CVE-2009-3094] The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
2691| [CVE-2009-2699] The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
2692| [CVE-2009-1891] The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
2693| [CVE-2009-1195] The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
2694| [CVE-2009-1191] mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
2695| [CVE-2008-3666] Unspecified vulnerability in Sun Solaris 10 and OpenSolaris before snv_96 allows (1) context-dependent attackers to cause a denial of service (panic) via vectors involving creation of a crafted file and use of the sendfilev system call, as demonstrated by a file served by an Apache 2.2.x web server with EnableSendFile configured
2696| [CVE-2008-2939] Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
2697| [CVE-2008-2364] The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
2698| [CVE-2008-2168] Cross-site scripting (XSS) vulnerability in Apache 2.2.6 and earlier allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded URLs that are not properly handled when displaying the 403 Forbidden error page.
2699| [CVE-2008-0456] CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
2700| [CVE-2008-0455] Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
2701| [CVE-2008-0005] mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
2702| [CVE-2007-6750] The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
2703| [CVE-2007-6423] ** DISPUTED ** Unspecified vulnerability in mod_proxy_balancer for Apache HTTP Server 2.2.x before 2.2.7-dev, when running on Windows, allows remote attackers to trigger memory corruption via a long URL. NOTE: the vendor could not reproduce this issue.
2704| [CVE-2007-6422] The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.
2705| [CVE-2007-6421] Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.
2706| [CVE-2007-6420] Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
2707| [CVE-2007-6388] Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
2708| [CVE-2007-6203] Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
2709| [CVE-2007-5000] Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
2710| [CVE-2007-4465] Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
2711| [CVE-2007-3304] Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
2712| [CVE-2007-3303] Apache httpd 2.0.59 and 2.2.4, with the Prefork MPM module, allows local users to cause a denial of service via certain code sequences executed in a worker process that (1) stop request processing by killing all worker processes and preventing creation of replacements or (2) hang the system by forcing the master process to fork an arbitrarily large number of worker processes. NOTE: This might be an inherent design limitation of Apache with respect to worker processes in hosted environments.
2713| [CVE-2007-1862] The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.
2714| [CVE-2007-0792] The mod_perl initialization script in Bugzilla 2.23.3 does not set the Bugzilla Apache configuration to allow .htaccess permissions to override file permissions, which allows remote attackers to obtain the database username and password via a direct request for the localconfig file.
2715| [CVE-2006-4110] Apache 2.2.2, when running on Windows, allows remote attackers to read source code of CGI programs via a request that contains uppercase (or alternate case) characters that bypass the case-sensitive ScriptAlias directive, but allow access to the file on case-insensitive file systems.
2716| [CVE-2006-3918] http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
2717| [CVE-2006-3747] Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
2718| [CVE-2006-2806] The SMTP server in Apache Java Mail Enterprise Server (aka Apache James) 2.2.0 allows remote attackers to cause a denial of service (CPU consumption) via a long argument to the MAIL command.
2719| [CVE-2006-1292] Directory traversal vulnerability in Jim Hu and Chad Little PHP iCalendar 2.21 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in the phpicalendar[cookie_language] and phpicalendar[cookie_style] cookies, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included by day.php.
2720| [CVE-2006-1079] htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
2721| [CVE-2006-1078] Multiple buffer overflows in htpasswd, as used in Acme thttpd 2.25b, and possibly other products such as Apache, might allow local users to gain privileges via (1) a long command line argument and (2) a long line in a file. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
2722| [CVE-2004-2650] Spooler in Apache Foundation James 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak.
2723| [CVE-2003-1172] Directory traversal vulnerability in the view-source sample file in Apache Software Foundation Cocoon 2.1 and 2.2 allows remote attackers to access arbitrary files via a .. (dot dot) in the filename parameter.
2724| [CVE-2002-1233] A regression error in the Debian distributions of the apache-ssl package (before 1.3.9 on Debian 2.2, and before 1.3.26 on Debian 3.0), for Apache 1.3.27 and earlier, allows local users to read or modify the Apache password file via a symlink attack on temporary files when the administrator runs (1) htpasswd or (2) htdigest, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2001-0131.
2725|
2726| SecurityFocus - https://www.securityfocus.com/bid/:
2727| [42102] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
2728| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
2729|
2730| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2731| [75211] Debian GNU/Linux apache 2 cross-site scripting
2732|
2733| Exploit-DB - https://www.exploit-db.com:
2734| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
2735| [31052] Apache <= 2.2.6 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
2736| [30901] Apache HTTP Server 2.2.6 Windows Share PHP File Extension Mapping Information Disclosure Vulnerability
2737| [30835] Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness
2738| [28365] Apache 2.2.2 CGI Script Source Code Information Disclosure Vulnerability
2739| [27915] Apache James 2.2 SMTP Denial of Service Vulnerability
2740| [18984] Apache Struts <= 2.2.1.1 - Remote Command Execution
2741| [17691] Apache Struts < 2.2.0 - Remote Command Execution
2742| [15319] Apache 2.2 (Windows) Local Denial of Service
2743| [11650] Apache 2.2.14 mod_isapi Dangling Pointer Remote SYSTEM Exploit
2744|
2745| OpenVAS (Nessus) - http://www.openvas.org:
2746| [100858] Apache 'mod_proxy_http' 2.2.9 for Unix Timeout Handling Information Disclosure Vulnerability
2747|
2748| SecurityTracker - https://www.securitytracker.com:
2749| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
2750| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
2751| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
2752| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
2753| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
2754|
2755| OSVDB - http://www.osvdb.org:
2756| [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
2757|_
2758443/tcp open ssl/http Apache Tomcat/Coyote JSP engine 1.1
2759|_http-server-header: Apache-Coyote/1.1
2760| vulscan: VulDB - https://vuldb.com:
2761| [93735] Zoho ManageEngine OpManager 12100/12200 Notes index.jsp cross site scripting
2762| [93734] Zoho ManageEngine OpManager 12100/12200 Packet Loss Graph index.jsp cross site scripting
2763| [93733] Zoho ManageEngine OpManager 12100/12200 index.jsp cross site scripting
2764| [140234] Zoho ManageEngine Application Manager up to 14.2 NewThresholdConfiguration.jsp Parameter sql injection
2765| [140233] Zoho ManageEngine ManageEngine OpManager up to 12.4x NewThresholdConfiguration.jsp Parameter sql injection
2766| [139385] Apache Tika 1.19/1.20/1.21 SAXParsers Hang denial of service
2767| [136646] Apache Allura up to 1.10.x Dropdown Selector Stored cross site scripting
2768| [135390] Zoho ManageEngine Application Manager 13.1 Build 13100 Alarm File Upload privilege escalation
2769| [135389] Zoho ManageEngine Application Manager 13.1 Build 13100 Widget cross site scripting
2770| [135388] Zoho ManageEngine Application Manager 13.1 Build 13100 /auditLogAction.do sql injection
2771| [133984] Zoho ManageEngine Applications Manager 12.x/13.x/14 FaultTemplateOptions.jsp sql injection
2772| [133955] Zoho ManageEngine Applications Manager 11.x/12.x/13.x/14.0 Popup_SLA.jsp sql injection
2773| [133315] Apache Airflow up to 1.10.2 HTTP Endpoint cross site request forgery
2774| [133314] Apache Airflow up to 1.10.2 Metadata Database cross site scripting
2775| [131236] Apache Airflow up to 1.10.1 Metadata Database cross site scripting
2776| [130529] Apache Subversion 1.10.0/1.10.1/1.10.2/1.10.3/1.11.0 mod_dav_svn Directory Crash denial of service
2777| [130212] Apache Airflow up to 1.10.0 LDAP Auth Backend Certificate weak authentication
2778| [128109] Apache NiFi 1.8.0 Error Page message-page.jsp Request Header cross site scripting
2779| [127981] Apache OFBiz 16.11.01/16.11.02/16.11.03/16.11.04 HTTP Engine httpService GET Request privilege escalation
2780| [127794] Pippo 1.11.0 jaxb/JaxbEngine.java XML External Entity
2781| [125261] Pippo up to 1.11.0 XstreamEngine Code Execution
2782| [125133] Apache Tika up to 1.19 XML Parser reset() denial of service
2783| [124876] Apache Ranger up to 1.1.x UnixAuthenticationService Stack-based memory corruption
2784| [124286] Apache Tika up to 1.18 IptcAnpaParser Loop denial of service
2785| [122802] Plex Media Server 1.13.2.5154 XML Parsing Engine XML External Entity
2786| [122455] Apache Tomcat Native up to 1.1.34/1.2.16 OSCP Revoked Certificate weak authentication
2787| [122454] Apache Tomcat Native up to 1.1.34/1.2.16 OSCP Responder Revoked Certificate weak authentication
2788| [122103] Battle for Wesnoth up to 1.14.3 Lua Scripting Engine Code Execution
2789| [117117] Apache Tika up to 1.17 ChmParser Loop denial of service
2790| [117116] Apache Tika up to 1.17 BPGParser Loop denial of service
2791| [117115] Apache Tika up to 1.17 tika-server command injection
2792| [114717] Apache Commons 1.11/1.12/1.13/1.14/1.15 ZIP Archive ZipFile/ZipArchiveInputStream denial of service
2793| [112841] JSP Tickets 1.1 on Joomla Parameter sql injection
2794| [112677] Apache Tomcat Native Connector up to 1.1.34/1.2.14 OCSP Checker Client weak authentication
2795| [112510] brace-expansion up to 1.1.6 Regular Expression index.jsp denial of service
2796| [112314] NetGain Enterprise Manager 7.2.730 Build 1034 org.apache.jsp.u.jsp.tools.exec_jsp Servlet Parameter privilege escalation
2797| [110785] Apache Drill up to 1.11.0 Query Page unknown vulnerability
2798| [108781] Apache jUDDI up to 1.x happyjuddi.jsp Parameter cross site scripting
2799| [108780] Apache jUDDI up to 1.x Log File uddiget.jsp spoofing
2800| [107266] Apache Tika up to 1.12 XML Parser XML External Entity
2801| [107262] Apache Mesos up to 1.1.2/1.2.1/1.3.0/1.4.0-dev libprocess HTTP Request Crash denial of service
2802| [107258] Apache Mesos up to 1.1.2/1.2.1/1.3.0/1.4.0-dev libprocess HTTP Request Crash denial of service
2803| [106739] puppetlabs-apache up to 1.11.0/2.0.x weak authentication
2804| [106101] Zoho ManageEngine Firewall Analyzer 12200 Group Chat shell.jsp PHP File privilege escalation
2805| [105980] Apache Engine 16.11.01 Parameter Reflected unknown vulnerability
2806| [104983] Apache Wink up to 1.1.1 XML Document xxe privilege escalation
2807| [102783] Microsoft Malware Protection Engine up to 1.1.13804.0 on 32-bit mpengine.dll memory corruption
2808| [102070] Apache CXF Fediz up to 1.1.2/1.2.0 Application Plugin denial of service
2809| [100422] Reporting Module 1.12.0 on OpenMRS manageReports.jsp cross site request forgery
2810| [99299] Apache Geode up to 1.1.0 Pulse OQL Query privilege escalation
2811| [93736] Zoho ManageEngine OpManager 12100/12200 Cookie weak encryption
2812| [93732] Zoho ManageEngine OpManager 12100/12200 DNS Name cross site scripting
2813| [93731] Zoho ManageEngine OpManager 12100/12200 EncryptPassword API denial of service
2814| [80638] Hospira LifeCare PCA Infusion System up to 1.1 Communication Engine Stack-Based memory corruption
2815| [77949] Newphoria Applican Framework up to 1.12.2 on Android/iOS Runtime Engine whitelist.xml privilege escalation
2816| [76654] Cisco Identity Services Engine 1.1(4.1)/1.3(106.146)/1.3(120.135) Web Interface Clickjacking privilege escalation
2817| [67911] Oracle Retail Clearance Optimization Engine 13.3/13.4/14.0 Apache commons-beanutils-1.8.0.jar memory corruption
2818| [70338] Apache Syncope up to 1.1.7 unknown vulnerability
2819| [29831] Microsoft Malware Protection Engine up to 1.1.10600.0 denial of service
2820| [69385] Apache Syncope up to 1.1.6 unknown vulnerability
2821| [65346] Cisco Identity Services Engine Software up to 1.1.2 privilege escalation
2822| [65051] Little CMS Color Engine up to 1.19 Utility Stack-based memory corruption
2823| [64172] Jspautsch FirstLastNames 1.1.1 cross site scripting
2824| [8747] Microsoft Malware Protection Engine 1.1.9402.0 File Scan memory corruption
2825| [6517] Cisco Identity Services Engine up to 1.1.1 cross site request forgery
2826| [53368] Apache MyFaces 1.1.7/1.2.8 cross site scripting
2827| [46004] Apache Jackrabbit 1.4/1.5.0 search.jsp cross site scripting
2828| [45272] Little cms color engine up to 1.10 cmsAllocGamma memory corruption
2829| [45271] Little cms color engine up to 1.10 ReadEmbeddedTextTag memory corruption
2830| [44575] CafeEngine Easycafeengine 1.1 dish.php sql injection
2831| [44574] CafeEngine Easycafeengine 1.1 index.php sql injection
2832| [42328] Microsoft Windows Live Onecare 1.1.3520.0 Malware Protection Engine mpengine.dll denial of service
2833| [42327] Microsoft Windows Live Onecare 1.1.3520.0 Malware Protection Engine mpengine.dll denial of service
2834| [39385] Mozilla SeaMonkey 1.1.4 Javascript Engine memory corruption
2835| [3310] Apache OpenOffice 1.1.3/2.0.4/2.2.1 TIFF Image Parser Heap-based memory corruption
2836| [37320] Apache MyFaces Tomahawk up to 1.1.4 cross site scripting
2837|
2838| MITRE CVE - https://cve.mitre.org:
2839| [CVE-2012-3908] Multiple cross-site request forgery (CSRF) vulnerabilities in the ISE Administrator user interface (aka the Apache Tomcat interface) on Cisco Identity Services Engine (ISE) 3300 series appliances before 1.1.0.665 Cumulative Patch 1 allow remote attackers to hijack the authentication of administrators, aka Bug ID CSCty46684.
2840| [CVE-2010-3863] Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
2841| [CVE-2009-1305] The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
2842| [CVE-2005-1753] ** DISPUTED ** ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
2843| [CVE-2013-1768] The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
2844| [CVE-2013-1346] mpengine.dll in Microsoft Malware Protection Engine before 1.1.9506.0 on x64 platforms allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file.
2845| [CVE-2012-6117] Aeolus Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for /var/log/aeolus-configserver/configserver.log, which allows local users to read plaintext passwords by reading the log file.
2846| [CVE-2012-5509] aeolus-configserver-setup in the Aeolas Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for a temporary file in /tmp, which allows local users to read credentials by reading this file.
2847| [CVE-2012-2379] Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
2848| [CVE-2012-2378] Apache CXF 2.4.5 through 2.4.7, 2.5.1 through 2.5.3, and 2.6.x before 2.6.1, does not properly enforce child policies of a WS-SecurityPolicy 1.1 SupportingToken policy on the client side, which allows remote attackers to bypass the (1) AlgorithmSuite, (2) SignedParts, (3) SignedElements, (4) EncryptedParts, and (5) EncryptedElements policies.
2849| [CVE-2012-1462] The ZIP file parser in AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, Norman Antivirus 6.06.12, Sophos Anti-Virus 4.61.0, and AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11 allows remote attackers to bypass malware detection via a ZIP file containing an invalid block of data at the beginning. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ZIP parser implementations.
2850| [CVE-2012-1461] The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with multiple compressed streams. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
2851| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
2852| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
2853| [CVE-2012-1456] The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
2854| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
2855| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
2856| [CVE-2012-1429] The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, and nProtect Anti-Virus 2011-01-17.01 allows remote attackers to bypass malware detection via an ELF file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
2857| [CVE-2012-1425] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \50\4B\03\04 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
2858| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
2859| [CVE-2011-3012] The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.
2860| [CVE-2011-0533] Cross-site scripting (XSS) vulnerability in Apache Continuum 1.1 through 1.2.3.1, 1.3.6, and 1.4.0 Beta
2861| [CVE-2011-0037] Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key.
2862| [CVE-2010-4408] Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449.
2863| [CVE-2010-3449] Cross-site request forgery (CSRF) vulnerability in Redback before 1.2.4, as used in Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1
2864| [CVE-2010-2086] Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.
2865| [CVE-2010-2057] shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack.
2866| [CVE-2009-5120] The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP port 1812 from arbitrary source IP addresses, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via UTF-7 text to the 404 error page of a Project Woodstock service on this port.
2867| [CVE-2009-3075] Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
2868| [CVE-2009-3072] Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
2869| [CVE-2009-1833] The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c
2870| [CVE-2009-1392] The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr
2871| [CVE-2009-1304] The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date
2872| [CVE-2009-1303] The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
2873| [CVE-2009-1302] The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
2874| [CVE-2009-0774] The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
2875| [CVE-2009-0773] The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption
2876| [CVE-2009-0772] The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
2877| [CVE-2009-0771] The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
2878| [CVE-2009-0353] Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.
2879| [CVE-2009-0352] Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and destruction of arbitrary layout objects by the nsViewManager::Composite function.
2880| [CVE-2009-0026] Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the q parameter to (1) search.jsp or (2) swr.jsp.
2881| [CVE-2008-7015] Unreal engine 3, as used in Unreal Tournament 3 1.3, Frontlines: Fuel of War 1.1.1, and other products, allows remote attackers to cause a denial of service (server exit) via a packet with a large length value that triggers a memory allocation failure.
2882| [CVE-2008-6282] SQL injection vulnerability in engine/users/users_edit_pub.inc in CMS Ortus 1.13 and earlier allows remote authenticated users to execute arbitrary SQL commands via the city parameter in a users_edit_pub action to index.php.
2883| [CVE-2008-5720] Cross-site scripting (XSS) vulnerability in Mayaa before 1.1.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving the default error page for the org.seasar.mayaa.impl.engine.PageNotFoundException exception and possibly other exceptions.
2884| [CVE-2008-5502] The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions.
2885| [CVE-2008-5501] The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service via vectors that trigger an assertion failure.
2886| [CVE-2008-5500] The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
2887| [CVE-2008-5317] Integer signedness error in the cmsAllocGamma function in src/cmsgamma.c in Little cms color engine (aka lcms) before 1.17 allows attackers to have an unknown impact via a file containing a certain "number of entries" value, which is interpreted improperly, leading to an allocation of insufficient memory.
2888| [CVE-2008-5316] Buffer overflow in the ReadEmbeddedTextTag function in src/cmsio1.c in Little cms color engine (aka lcms) before 1.16 allows attackers to have an unknown impact via vectors related to a length parameter inconsistency involving the contents of "the input file," a different vulnerability than CVE-2007-2741.
2889| [CVE-2008-5052] The AppendAttributeValue function in the JavaScript engine in Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger memory corruption, as demonstrated by e4x/extensions/regress-410192.js.
2890| [CVE-2008-5018] The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.
2891| [CVE-2008-5017] Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.
2892| [CVE-2008-5016] The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.
2893| [CVE-2008-4604] SQL injection vulnerability in index.php in Easy CafeEngine 1.1 allows remote attackers to execute arbitrary SQL commands via the itemid parameter.
2894| [CVE-2008-4062] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
2895| [CVE-2008-4061] Integer overflow in the MathML component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via an mtd element with a large integer value in the rowspan attribute, related to the layout engine.
2896| [CVE-2008-3257] Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
2897| [CVE-2008-2799] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
2898| [CVE-2008-2798] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
2899| [CVE-2008-2131] Cross-site scripting (XSS) vulnerability in mvnForum 1.1 GA allows remote authenticated users to inject arbitrary web script or HTML via the topic field, which is later displayed by user/viewthread.jsp through use of the "quick reply button."
2900| [CVE-2008-1438] Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (disk space exhaustion) via a file with "crafted data structures" that trigger the creation of large temporary files, a different vulnerability than CVE-2008-1437.
2901| [CVE-2008-1437] Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438.
2902| [CVE-2008-1380] The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page. NOTE: this is due to an incorrect fix for CVE-2008-1237.
2903| [CVE-2008-1237] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
2904| [CVE-2008-1236] Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
2905| [CVE-2008-0413] The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) certain uses of watch and eval, (3) certain uses of the mousedown event listener, and other vectors.
2906| [CVE-2008-0412] The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.
2907| [CVE-2007-5340] Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.
2908| [CVE-2007-5249] Multiple buffer overflows in the logging function in the Unreal engine, as used by America's Army and America's Army Special Forces 2.8.2 and earlier, when Punkbuster (PB) is enabled, allow remote attackers to cause a denial of service (daemon crash) via a long (1) PB_Y packet to the YPG server on UDP port 1716 or (2) PB_U packet to UCON on UDP port 1716, different vectors than CVE-2007-4442. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain.
2909| [CVE-2007-4508] Stack-based buffer overflow in Rebellion Asura engine, as used for the server in Rogue Trooper 1.0 and earlier and Prism 1.1.1.0 and earlier, allows remote attackers to execute arbitrary code via a long string in a 0xf007 packet for the challenge B query.
2910| [CVE-2007-3101] Multiple cross-site scripting (XSS) vulnerabilities in certain JSF applications in Apache MyFaces Tomahawk before 1.1.6 allow remote attackers to inject arbitrary web script via the autoscroll parameter, which is injected into Javascript that is sent to the client.
2911| [CVE-2007-2868] Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
2912| [CVE-2007-2867] Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
2913| [CVE-2006-6445] Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
2914| [CVE-2006-3747] Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
2915| [CVE-2006-1143] Cross-site scripting (XSS) vulnerability in FTPoed Blog Engine 1.1 allows remote attackers to inject arbitrary web script or HTML via the comment_body parameter, as used by the comment field, when posting a comment.
2916| [CVE-2006-0254] Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.
2917| [CVE-2005-4284] Cross-site scripting (XSS) vulnerability in StaticStore Search Engine 1.189A and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified parameters to search.cgi, possibly the keywords parameter. NOTE: this issue was originally disputed by the vendor, but it has since been acknowledged.
2918| [CVE-2005-1754] ** DISPUTED ** JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products."
2919| [CVE-2004-1395] The Lithtech engine, as used in (1) Contract Jack 1.1 and earlier, (2) No one lives forever 2 1.3 and earlier, (3) Tron 2.0 1.042 and earlier, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote attackers to cause a denial of service (connection refused) via a UDP packet that causes recvfrom to generate a return code that causes the listening loop to exit, as demonstrated using zero byte packets or packets between 8193 and 12280 bytes, which result in conditions that are not "Operation would block."
2920| [CVE-2004-0700] Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
2921| [CVE-2004-0608] The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory.
2922| [CVE-2003-1498] Cross-site scripting (XSS) vulnerability in search.php for WRENSOFT Zoom Search Engine 2.0 Build 1018 and earlier allows remote attackers to inject arbitrary web script or HTML via the zoom_query parameter.
2923| [CVE-2003-0658] Docview before 1.1-18 in Caldera OpenLinux 3.1.1, SCO Linux 4.0, OpenServer 5.0.7, configures the Apache web server in a way that allows remote attackers to read arbitrary publicly readable files via a certain URL, possibly related to rewrite rules.
2924| [CVE-2002-0259] InstantServers MiniPortal 1.1.5 and earlier stores sensitive login and account data in plaintext in (1) .pwd files in the miniportal/apache directory, or (2) mplog.txt, which could allow local users to gain privileges.
2925| [CVE-2001-0591] Directory traversal vulnerability in Oracle JSP 1.0.x through 1.1.1 and Oracle 8.1.7 iAS Release 1.0.2 can allow a remote attacker to read or execute arbitrary .jsp files via a '..' (dot dot) attack.
2926| [CVE-2000-1247] The default configuration of the jserv-status handler in jserv.conf in Apache JServ 1.1.2 includes an "allow from 127.0.0.1" line, which allows local users to discover JDBC passwords or other sensitive information via a direct request to the jserv/ URI.
2927| [CVE-1999-0071] Apache httpd cookie buffer overflow for versions 1.1.1 and earlier.
2928|
2929| SecurityFocus - https://www.securityfocus.com/bid/:
2930| [94941] Huawei CloudEngine 12800 CVE-2016-8782 Denial of Service Vulnerability
2931| [37966] Apache 1.3 mod_proxy HTTP Chunked Encoding Integer Overflow Vulnerability
2932| [27237] Apache HTTP Server 2.2.6, 2.0.61 and 1.3.39 'mod_status' Cross-Site Scripting Vulnerability
2933| [4995] Apache Tomcat JSP Engine Denial of Service Vulnerability
2934| [1986] Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability
2935| [72299] ManageEngine ServiceDesk Plus 'CreateReportTable.jsp' SQL Injection Vulnerability
2936| [65935] Apache Shiro 'login.jsp' Authentication Bypass Vulnerability
2937| [35630] ManageEngine NetFlow Analyzer 'jspui/index.jsp' Cross Site Scripting Vulnerability
2938| [26368] ManageEngine OpManager JSP/Login.DO Multiple Cross Site Scripting Vulnerabilities
2939| [25531] Apache Tomcat Cal2.JSP Cross-Site Scripting Vulnerability
2940| [24476] Apache Tomcat JSP Example Web Applications Cross Site Scripting Vulnerability
2941| [17604] Cisco Wireless Lan Solution Engine ArchiveApplyDisplay.JSP Cross-Site Scripting Vulnerability
2942| [15687] Java Search Engine Search.JSP Cross-Site Scripting Vulnerability
2943| [12537] IBM WebSphere Application Server JSP Engine Source Code Disclosure Vulnerability
2944| [11803] Apache Jakarta Results.JSP Remote Cross-Site Scripting Vulnerability
2945| [5542] Apache Tomcat 4.1 JSP Request Cross Site Scripting Vulnerability
2946| [4997] Macromedia JRun JSP Engine Denial Of Service Vulnerability
2947| [4878] Apache Tomcat RealPath.JSP Malformed Request Information Disclosure Vulnerability
2948| [4876] Apache Tomcat Source.JSP Malformed Request Information Disclosure Vulnerability
2949|
2950| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2951| [12667] SurfControl E-mail Filter for SMTP rules engine 16 or more .zip files filter bypass
2952| [79407] ManageEngine Support Center Plus UploadImage.jsp file upload
2953| [68164] ManageEngine ServiceDesk Plus FileDownload.jsp directory traversal
2954| [67532] IBM WebSphere Application Server org.apache.jasper.runtime.JspWriterImpl.response denial of service
2955| [63422] Apache Tomcat sessionsList.jsp cross-site scripting
2956| [61940] IBM FileNet Application Engine .jsp cross-site scripting
2957| [61070] Apache Jackrabbit search.jsp SQL injection
2958| [58056] Apache ActiveMQ .jsp source code disclosure
2959| [53997] Mozilla Firefox browser engine unspecified code execution variant 1
2960| [51630] ManageEngine Netflow Analyzer index.jsp cross-site scripting
2961| [49213] Apache Tomcat cal2.jsp cross-site scripting
2962| [48110] Apache Jackrabbit search.jsp and swr.jsp cross-site scripting
2963| [45351] Multiple Mozilla products layout engine code execution variant 1
2964| [42915] Apache Tomcat JSP files path disclosure
2965| [36467] Apache Tomcat functions.jsp cross-site scripting
2966| [34869] Apache Tomcat JSP example Web application cross-site scripting
2967| [34377] Apache Tomcat hello.jsp cross-site scripting
2968| [34207] Apache Tomcat implicit-objects.jsp cross-site scripting
2969| [24158] Apache Geronimo jsp-examples cross-site scripting
2970| [23410] Java Search Engine search.jsp allows cross-site scripting
2971| [22109] Apache HTTP Server ssl_engine_kernel client certificate validation
2972| [13254] Apache Tomcat .jsp cross-site scripting
2973| [9339] Multiple vendor JSP Engine WPrinterJob() denial of service
2974| [6971] Apache Jakarta Tomcat may reveal JSP source code with missing HTTP protocol specification
2975| [6316] Apache Jakarta Tomcat may reveal JSP source code
2976|
2977| Exploit-DB - https://www.exploit-db.com:
2978| [30191] Apache MyFaces Tomahawk JSF Framework 1.1.5 Autoscroll Parameter Cross Site Scripting Vulnerability
2979| [27095] Apache Tomcat / Geronimo 1.0 Sample Script cal2.jsp time Parameter XSS
2980| [23244] WrenSoft Zoom Search Engine 2.0 Build: 1018 Cross-Site Scripting Vulnerability
2981| [19536] Apache <= 1.1,NCSA httpd <= 1.5.2,Netscape Server 1.12/1.1/2.0 a nph-test-cgi Vulnerability
2982| [30983] ExpressionEngine 1.2.1 HTTP Response Splitting and Cross Site Scripting Vulnerabilities
2983| [30980] AwesomeTemplateEngine 1 Multiple Cross-Site Scripting Vulnerabilities
2984| [30543] Doomsday Engine 1.8.6/1.9 - Multiple Remote Vulnerabilities
2985| [29930] Apache AXIS 1.0 Non-Existent WSDL Path Information Disclosure Vulnerability
2986| [29012] DMXReady Site Engine Manager 1.0 Index.ASP SQL Injection Vulnerability
2987| [28874] Exhibit Engine 1.22 fstyles.php toroot Parameter Remote File Inclusion
2988| [28873] Exhibit Engine 1.22 fetchsettings.php toroot Parameter Remote File Inclusion
2989| [27980] Alex DownloadEngine 1.4.1 Comments.PHP SQL Injection Vulnerability
2990| [27823] OpenEngine 1.7/1.8 Template Unauthorized Access Vulnerability
2991| [27574] Basic Analysis and Security Engine 1.2.4 PrintFreshPage Cross-Site Scripting Vulnerability
2992| [27127] PMachine ExpressionEngine 1.4.1 HTTP Referrer HTML Injection Vulnerability
2993| [27096] Apache Geronimo 1.0 Error Page XSS
2994| [26542] Apache Struts 1.2.7 Error Response Cross-Site Scripting Vulnerability
2995| [26395] Basic Analysis And Security Engine 1.2 Base_qry_main.PHP SQL Injection Vulnerability
2996| [25625] Apache 1.3.x HTDigest Realm Command Line Argument Buffer Overflow Vulnerability (2)
2997| [25624] Apache 1.3.x HTDigest Realm Command Line Argument Buffer Overflow Vulnerability (1)
2998| [24694] Apache 1.3.x mod_include Local Buffer Overflow Vulnerability
2999| [23752] Digital Reality Game Engine 1.0.x Remote Denial of Service Vulnerability
3000| [23751] Apache Cygwin 1.3.x/2.0.x Directory Traversal Vulnerability
3001| [23314] Serious Sam Engine 1.0.5 - Remote Denial of Service Vulnerability
3002| [22961] Gallery 1.2/1.3.x Search Engine Cross-Site Scripting Vulnerability
3003| [22505] Apache Mod_Access_Referer 1.0.2 NULL Pointer Dereference Denial of Service Vulnerability
3004| [22068] Apache 1.3.x,Tomcat 4.0.x/4.1.x Mod_JK Chunked Encoding Denial of Service Vulnerability
3005| [21885] Apache 1.3/2.0.x Server Side Include Cross Site Scripting Vulnerability
3006| [21560] Apache 1.x/2.0.x Chunked-Encoding Memory Corruption Vulnerability (2)
3007| [21559] Apache 1.x/2.0.x Chunked-Encoding Memory Corruption Vulnerability (1)
3008| [21534] Apache Tomcat 3/4 JSP Engine Denial of Service Vulnerability
3009| [21350] Apache Win32 1.3.x/2.0.x Batch File Remote Command Execution Vulnerability
3010| [21295] GNUJSP 1.0 File Disclosure Vulnerability
3011| [21257] AHG Search Engine 1.0 Search.CGI Arbitrary Command Execution Vulnerability
3012| [21204] Apache 1.3.20 Win32 PHP.EXE Remote File Disclosure Vulnerability
3013| [21067] Apache 1.0/1.2/1.3 Server Address Disclosure Vulnerability
3014| [21002] Apache 1.3 Possible Directory Index Disclosure Vulnerability
3015| [20911] Apache 1.3.14 Mac File Protection Bypass Vulnerability
3016| [20695] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (4)
3017| [20694] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (3)
3018| [20693] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (2)
3019| [20692] Apache 1.3 Artificially Long Slash Path Directory Listing Vulnerability (1)
3020| [20595] NCSA 1.3/1.4.x/1.5,Apache httpd 0.8.11/0.8.14 ScriptAlias Source Retrieval Vulnerability
3021| [20558] Apache 1.2 Web Server DoS Vulnerability
3022| [20466] Apache 1.3 Web Server with Php 3 File Disclosure Vulnerability
3023| [20457] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_peekqueue Buffer Overflow Vulnerability
3024| [20456] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_showcolv Buffer Overflow Vulnerability
3025| [20451] Microsoft SQL Server 7.0/2000,Data Engine 1.0/2000 xp_displayparamstmt Buffer Overflow Vulnerability
3026| [20435] Apache 0.8.x/1.0.x,NCSA httpd 1.x test-cgi Directory Listing Vulnerability
3027| [20429] Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability
3028| [20272] Apache 1.2.5/1.3.1,UnityMail 2.0 MIME Header DoS Vulnerability
3029| [20210] Apache 1.3.12 WebDAV Directory Listings Vulnerability
3030| [20172] ManageEngine Mobile Application Manager 10 - SQL Injection
3031| [20171] ManageEngine Application Manager 10 - Multiple Vulnerabilities
3032| [19975] Apache 1.3.6/1.3.9/1.3.11/1.3.12/1.3.20 Root Directory Access Vulnerability
3033| [18031] phpLDAPadmin <= 1.2.1.1 (query_engine) Remote PHP Code Injection
3034| [18021] phpLDAPadmin <= 1.2.1.1 (query_engine) Remote PHP Code Injection Exploit
3035| [17639] XpressEngine 1.4.5.7 Persistent XSS Vulnerability
3036| [16798] Apache mod_jk 1.2.20 Buffer Overflow
3037| [15710] Apache Archiva 1.0 - 1.3.1 CSRF Vulnerability
3038| [15557] openEngine 2.0 100226 LFI and XSS Vulnerabilities
3039| [12721] Apache Axis2 1.4.1 - Local File Inclusion Vulnerability
3040| [12550] Netvidade engine 1.0 - Multiple Vulnerabilities
3041| [8994] AWScripts Gallery Search Engine 1.x Insecure Cookie Vulnerability
3042| [8414] XEngineSoft PMS/MGS/NM/AMS 1.0 (Auth Bypass) SQL Injection Vulns
3043| [8408] X10Media Mp3 Search Engine < 1.6.2 Admin Access Vulnerability
3044| [7158] Alex Article-Engine 1.3.0 (fckeditor) Arbitrary File Upload Vulnerability
3045| [7157] Alex News-Engine 1.5.1 - Remote Arbitrary File Upload Vulnerability
3046| [7074] X10media Mp3 Search Engine <= 1.6 - Remote File Disclosure Vulnerability
3047| [6480] x10media mp3 search engine 1.5.5 - Remote File Inclusion Vulnerability
3048| [6239] Ruby <= 1.9 (regex engine) Remote Socket Memory Leak Exploit
3049| [6100] Apache mod_jk 1.2.19 Remote Buffer Overflow Exploit (win32)
3050| [5834] Comparison Engine Power 1.0 - Blind SQL Injection Exploit
3051| [4093] Apache mod_jk 1.2.19/1.2.20 Remote Buffer Overflow Exploit
3052| [3605] Picture-Engine <= 1.2.0 (wall.php cat) Remote SQL Injection Exploit
3053| [3384] Ubuntu/Debian Apache 1.3.33/1.3.34 (CGI TTY) Local Root Exploit
3054| [3104] PPC Search Engine 1.61 (INC) Multiple Remote File Include Vulnerabilities
3055| [2850] Exhibit Engine <= 1.22 (styles.php) Remote File Include Vulnerability
3056| [2521] Download-Engine <= 1.4.2 (spaw) Remote File Include Vulnerability
3057| [2509] Exhibit Engine <= 1.5 RC 4 (photo_comment.php) File Include Exploit
3058| [2480] phpBB Security Suite Mod 1.0.0 (logger_engine.php) Remote File Include
3059| [2237] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC
3060| [1750] Quake 3 Engine 1.32b R_RemapShader() Remote Client BoF Exploit
3061| [587] Apache <= 1.3.31 mod_include Local Buffer Overflow Exploit
3062| [466] htpasswd Apache 1.3.31 - Local Exploit
3063| [132] Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit
3064| [126] Apache mod_gzip (with debug_mode) <= 1.2.26.1a Remote Exploit
3065| [67] Apache 1.3.x mod_mylo Remote Code Execution Exploit
3066|
3067| OpenVAS (Nessus) - http://www.openvas.org:
3068| [64251] Debian Security Advisory DSA 1816-1 (apache2)
3069| [58360] Debian Security Advisory DSA 1312-1 (libapache-mod-jk)
3070| [53848] Debian Security Advisory DSA 131-1 (apache)
3071| [53433] Debian Security Advisory DSA 181-1 (libapache-mod-ssl)
3072| [855821] Solaris Update for Apache 1.3 122912-19
3073| [855812] Solaris Update for Apache 1.3 122911-19
3074| [855737] Solaris Update for Apache 1.3 122911-17
3075| [855731] Solaris Update for Apache 1.3 122912-17
3076| [855695] Solaris Update for Apache 1.3 122911-16
3077| [855645] Solaris Update for Apache 1.3 122912-16
3078| [855587] Solaris Update for kernel update and Apache 108529-29
3079| [855566] Solaris Update for Apache 116973-07
3080| [855531] Solaris Update for Apache 116974-07
3081| [855524] Solaris Update for Apache 2 120544-14
3082| [855494] Solaris Update for Apache 1.3 122911-15
3083| [855478] Solaris Update for Apache Security 114145-11
3084| [855472] Solaris Update for Apache Security 113146-12
3085| [855179] Solaris Update for Apache 1.3 122912-15
3086| [855147] Solaris Update for kernel update and Apache 108528-29
3087| [855077] Solaris Update for Apache 2 120543-14
3088| [64559] Debian Security Advisory DSA 1834-2 (apache2)
3089| [64423] Debian Security Advisory DSA 1834-1 (apache2)
3090| [57788] Debian Security Advisory DSA 1247-1 (libapache-mod-auth-kerb)
3091| [57335] Debian Security Advisory DSA 1167-1 (apache)
3092| [57201] Debian Security Advisory DSA 1131-1 (apache)
3093| [57200] Debian Security Advisory DSA 1132-1 (apache2)
3094| [53851] Debian Security Advisory DSA 135-1 (libapache-mod-ssl)
3095| [53849] Debian Security Advisory DSA 132-1 (apache-ssl)
3096| [53738] Debian Security Advisory DSA 195-1 (apache-perl)
3097| [53737] Debian Security Advisory DSA 188-1 (apache-ssl)
3098| [53735] Debian Security Advisory DSA 187-1 (apache)
3099| [53577] Debian Security Advisory DSA 120-1 (libapache-mod-ssl, apache-ssl)
3100| [53393] Debian Security Advisory DSA 114-1 (gnujsp)
3101| [14771] Apache <= 1.3.33 htpasswd local overflow
3102|
3103| SecurityTracker - https://www.securitytracker.com:
3104| [1024764] Apache Tomcat Manager Input Validation Hole in 'sessionList.jsp' Permits Cross-Site Scripting Attacks
3105| [1005410] Apache Tomcat Java Servlet Engine Can Be Crashed Via Multiple Requests for DOS Device Names
3106| [1005290] Apache Tomcat Java Server Default Servlet Returns JSP Source Code to Remote Users
3107| [1004578] Jakarta Tomcat JSP Engine Can Be Crashed in a Multi-user Environment By One User's Malicious Code
3108| [1003602] GNUJSP Java Server Pages Implementation Discloses Web Files and Source Code to Remote Users and Bypasses Apache Access Control Restrictions
3109| [1028865] Apache Struts Bugs Permit Remote Code Execution and URL Redirection Attacks
3110| [1028864] Apache Struts Wildcard Matching and Expression Evaluation Bugs Let Remote Users Execute Arbitrary Code
3111| [1028837] Cisco Identity Services Engine Flaw in Firewall Implementation Lets Remote Users Deny Service
3112| [1028824] Apache mod_dav_svn URI Processing Flaw Lets Remote Users Deny Service
3113| [1028823] Apache Unspecified Flaw in mod_session_dbd Has Unspecified Impact
3114| [1028738] Cisco Identity Services Engine Input Validation Hole in Search Form Permits Cross-Site Scripting Attacks
3115| [1028724] (HP Issues Fix for HP-UX) Apache Web Server Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
3116| [1028722] (Red Hat Issues Fix for JBoss) Apache Tomcat Lets Remote Users Conduct DIGEST Authentication Replay Attacks
3117| [1028693] (Red Hat Issues Fix) Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks
3118| [1028622] Apache Struts 'includeParams' Bugs Permit Remote Command Execution and Cross-Site Scripting Attacks
3119| [1028621] Apache Subversion Bugs Let Remote Authenticated Users Execute Arbitrary Commands and Deny Service
3120| [1028568] Cisco Integrated Services Routers Crypto Engine Memory Management Flaw Lets Local Users Deny Service
3121| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
3122| [1028540] Apache mod_rewrite Input Validation Flaw Lets Remote Users Execute Arbitrary Commands
3123| [1028534] Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks
3124| [1028533] Apache Tomcat Lack of Chunked Transfer Encoding Extension Size Limit Lets Remote Users Deny Service
3125| [1028532] Apache Tomcat AsyncListeners Bug May Disclose Information from One Request to Another User
3126| [1028515] Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
3127| [1028457] Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information
3128| [1028287] Apache CXF WSS4JInInterceptor Grants Service Access to Remote Users
3129| [1028286] Apache CXF WS-Security UsernameToken Processing Flaw Lets Remote Users Bypass Authentication
3130| [1028252] Apache Commons FileUpload Unsafe Temporary File Lets Local Users Gain Elevated Privileges
3131| [1028207] Apache Input Validation Bugs Permit Cross-Site Scripting Attacks
3132| [1028152] Cisco Identity Services Engine Software Command Line Interface Flaw Lets Local Users Gain Root Privileges
3133| [1027836] Apache Tomcat Connection Processing Bug Lets Remote Users Deny Service
3134| [1027834] Apache Tomcat Bug Lets Remote Users Bypass Cross-Site Request Forgery Prevention Filter
3135| [1027833] Apache Tomcat Bug Lets Remote Users Bypass Security Constraints
3136| [1027729] Apache Tomcat Header Processing Bug Lets Remote Users Deny Service
3137| [1027728] Apache Tomcat Lets Remote Users Conduct DIGEST Authentication Replay Attacks
3138| [1027554] Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions
3139| [1027508] Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks
3140| [1027421] Apache Web Server Bugs Permit Cross-Site Scripting and Information Disclosure Attacks
3141| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
3142| [1027188] Cisco Application Control Engine IP Address Overlap May Let Remote Authenticated Administrators Login to the Incorrect Context
3143| [1027096] Apache Commons Compress BZip2CompressorOutputStream() Sorting Algorithm Lets Remote or Local Users Deny Service
3144| [1026950] Oracle Grid Engine Lets Local Users and Remote Authenticated Users Gain Root Privileges
3145| [1026932] Apache LD_LIBRARY_PATH Processing Lets Local Users Gain Elevated Privileges
3146| [1026928] Apache OFBiz Unspecified Flaw Lets Remote Users Execute Arbitrary Code
3147| [1026927] Apache OFBiz Input Validation Flaws Permit Cross-Site Scripting Attacks
3148| [1026847] Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service
3149| [1026846] Apache Wicket Discloses Hidden Application Files to Remote Users
3150| [1026839] Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks
3151| [1026616] Apache Bugs Let Remote Users Deny Service and Obtain Cookie Data
3152| [1026575] Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands
3153| [1026484] Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code
3154| [1026477] Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service
3155| [1026433] Owl Intranet Engine Authentication Flaw Lets Remote Users Gain Administrative Access
3156| [1026402] Apache Struts Conversion Error Lets Remote Users Inject Arbitrary Commands
3157| [1026353] Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers
3158| [1026295] Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges
3159| [1026267] Apache .htaccess File Integer Overflow Lets Local Users Execute Arbitrary Code
3160| [1026144] Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers
3161| [1026095] Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks
3162| [1026075] Cisco Identity Services Engine Default Credentials Let Remote Users Gain Administrative Access
3163| [1026062] Crystal Reports Input Validation Flaw in 'pubDBLogon.jsp' Permits Cross-Site Scripting Attacks
3164| [1026054] Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service
3165| [1025993] Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information
3166| [1025976] Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks
3167| [1025969] Cisco Intercompany Media Engine Bugs Let Remote Users Deny Service
3168| [1025960] Apache httpd Byterange Filter Processing Error Lets Remote Users Deny Service
3169| [1025925] Apache Tomcat Commons Daemon jsvc Lets Local Users Gain Elevated Privileges
3170| [1025924] Apache Tomcat XML Validation Flaw Lets Applications Obtain Potentially Sensitive Information
3171| [1025788] Apache Tomcat Lets Malicious Applications Obtain Information and Deny Service
3172| [1025755] Apache Santuario Buffer Overflow Lets Remote Users Deny Service
3173| [1025712] Apache Tomcat Discloses Passwords to Local Users in Certain Cases
3174| [1025590] Cisco Media Experience Engine Default Credentials Grant Root Access to Remote Users
3175| [1025577] Apache Archiva Input Validation Hole Permits Cross-Site Scripting Attacks
3176| [1025576] Apache Archiva Request Validation Flaw Permits Cross-Site Request Forgery Attacks
3177| [1025527] Apache APR Library apr_fnmatch() Flaw Lets Remote Users Execute Arbitrary Code
3178| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
3179| [1025303] Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users
3180| [1025215] Apache Tomcat May Ignore @ServletSecurity Annotation Protections
3181| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
3182| [1025066] Apache Continuum Input Validation Flaw Permits Cross-Site Request Forgery Attacks
3183| [1025065] Apache Continuum Input Validation Hole Permits Cross-Site Scripting Attacks
3184| [1025027] Apache Tomcat maxHttpHeaderSize Parsing Error Lets Remote Users Deny Service
3185| [1025026] Apache Tomcat Manager Input Validation Hole Permits Cross-Site Scripting Attacks
3186| [1025025] Apache Tomcat Security Manager Lets Local Users Bypass File Permissions
3187| [1024932] Windows Graphics Rendering Engine Stack Overflow in Processing Thumbnail Images Lets Remote Users Execute Arbitrary Code
3188| [1024544] Windows Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
3189| [1024456] IBM FileNet Application Engine URL-based Session IDs May Let Remote Users Hijack User Sessions
3190| [1024455] IBM FileNet Application Engine Input Validation Hole Permits Cross-Site Scripting Attacks
3191| [1024417] Apache Traffic Server Insufficient Randomization Lets Remote Users Poison the DNS Cache
3192| [1024332] Apache mod_cache and mod_dav Request Processing Flaw Lets Remote Users Deny Service
3193| [1024322] Cisco Application Control Engine RTSP/SIP/SSL Inspection Flaws Let Remote Users Deny Service
3194| [1024283] FreeType 2 Font Rendering Engine Stack Overflows Let Remote Users Execute Arbitrary Code
3195| [1024240] Qt Memory Corruption Error in QTextEngine::LayoutData::reallocate() May Let Remote Users Execute Arbitrary Code
3196| [1024214] SAP J2EE Engine Input Validation Flaw in Web Services Navigator Permits Cross-Site Scripting Attacks
3197| [1024180] Apache Tomcat 'Transfer-Encoding' Header Processing Flaw Lets Remote Users Deny Service and Obtain Potentially Sensitive Information
3198| [1024168] Cisco Application Control Engine Newline Processing Flaw May Let Remote Users Modify HTTP Headers
3199| [1024114] SAP J2EE Engine Telnet Interface Lets Remote Authenticated Users Bypass Some Administrative Access Controls
3200| [1024096] Apache mod_proxy_http May Return Results for a Different Request
3201| [1023942] Apache mod_proxy_ajp Error Condition Lets Remote Users Deny Service
3202| [1023941] Apache ap_read_request() Memory Error May Let Remote Users Access Potentially Sensitive Information
3203| [1023781] Mozilla Thunderbird Browser Engine Bugs Let Remote Users Execute Arbitrary Code
3204| [1023778] Apache ActiveMQ Input Validation Flaw Permits Cross-Site Scripting Attacks
3205| [1023775] Mozilla Firefox Browser Engine Bugs Let Remote Users Execute Arbitrary Code
3206| [1023701] Apache mod_isapi Error Processing Flaw May Let Remote Users Deny Service
3207| [1023668] Windows VBScript Script Engine Flaw in Processing Windows Help Files Lets Remote Users Execute Arbitrary Code
3208| [1023660] IBM WebSphere Portal Input Validation Hole in 'login.jsp' Permits Cross-Site Scripting Attacks
3209| [1023632] Mozilla Thunderbird Browser Engine Bugs Let Remote Users Execute Arbitrary Code
3210| [1023610] Mozilla Firefox Browser Engine Bugs Let Remote Users Execute Arbitrary Code
3211| [1023533] Apache mod_proxy Integer Overflow May Let Remote Users Execute Arbitrary Code
3212| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
3213| [1023334] Mozilla Seamonkey Bugs in JavaScript Engine and Browser Engine Let Remote Users Execute Arbitrary Code
3214| [1023333] Mozilla Firefox Bugs in JavaScript Engine and Browser Engine Let Remote Users Execute Arbitrary Code
3215| [1023303] CA Service Desk Input Validation Flaws in 'webengine' and 'freeaccess.spl' Permit Cross-Site Scripting Attacks
3216| [1023206] CiscoWorks Wireless LAN Solution Engine (WLSE) Protocol Flaw in SSL Renegotiation May Let Remote Users Conduct Man-in-the-Middle Attacks
3217| [1023205] Cisco Application Control Engine Protocol Flaw in SSL Renegotiation May Let Remote Users Conduct Man-in-the-Middle Attacks
3218| [1023090] Mozilla Firefox Bugs in JavaScript Engine, Browser Engine, and Other Components Let Remote Users Execute Arbitrary Code
3219| [1022988] Apache Solaris Support Code Bug Lets Remote Users Deny Service
3220| [1022949] Cisco Application Control Engine XML Gateway Discloses Internal IP Addresses to Remote Users
3221| [1022876] Mozilla Firefox Bugs in JavaScript Engine and Browser Engine Let Remote Users Execute Arbitrary Code
3222| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
3223| [1022585] Mozilla Firefox Bugs in JavaScript Engine and Browser Engine Let Remote Users Execute Arbitrary Code
3224| [1022543] Windows Embedded OpenType (EOT) Font Engine Buffer Overflow Lets Remote Users Execute Arbitrary Code
3225| [1022529] Apache mod_deflate Connection State Bug Lets Remote Users Deny Service
3226| [1022511] Sun Java System Web Server Discloses JSP Source Code to Remote Users
3227| [1022509] Apache mod_proxy stream_reqbody_cl() Infinite Loop Lets Remote Users Deny Service
3228| [1022405] CA ARCserve Backup Input Validation Flaw in Message Engine Lets Remote Users Deny Service
3229| [1022376] Mozilla Firefox Bugs in JavaScript Engine and Browser Engine May Let Remote Users Execute Arbitrary Code
3230| [1022357] Windows RPC Marshalling Engine Memory Error Lets Local Users Gain Elevated Privileges
3231| [1022296] Apache IncludesNoExec Options Restrictions Can Be Bypass By Local Users
3232| [1022264] Apache mod_proxy_ajp Bug May Disclose Another User's Response Data
3233| [1022090] Mozilla Firefox JavaScript and Browser Engine Memory Corruption Bugs May Let Remote Users Execute Arbitrary Code
3234| [1022001] Apache Tomcat mod_jk May Disclose Responses to the Wrong User
3235| [1021988] mod_perl Input Validation Flaw in Apache::Status and Apache2::Status Permits Cross-Site Scripting Attacks
3236| [1021795] Mozilla Firefox JavaScript and Layout Engine Memory Corruption Bugs May Let Remote Users Execute Arbitrary Code
3237| [1021769] Cisco Application Control Engine SNMP Processing Flaw Lets Remote Authenticated Users Deny Service
3238| [1021768] Cisco Application Control Engine SSH Processing Flaw Lets Remote Users Deny Service
3239| [1021762] Cisco Application Control Engine Default Passwords Let Remote Users Access the System
3240| [1021761] Cisco Application Control Engine Lets Remote Authenticated Users Gain Elevated Privileges
3241| [1021663] Mozilla Firefox Bugs in JavaScript Engine and Layout Engine May Let Remote Users Execute Arbitrary Code
3242| [1021530] Cisco Application Control Engine Global Site Selector DNS Bug Lets Remote Users Deny Service
3243| [1021417] Mozilla Firefox Bugs in JavaScript Engine and Layout Engine May Let Remote Users Execute Arbitrary Code
3244| [1021358] Solaris OpenSSL PKCS#11 Engine Session Cache Bug Lets Remote or Local Users Deny Service
3245| [1021350] NetWare Bug Lets Remote Users Access the ApacheAdmin Console
3246| [1021183] Mozilla Firefox Bugs in Browser Engine Let Remote Users Execute Arbitrary Code
3247| [1020933] Cisco IOS Intrusion Prevention System Bug in 'SERVICE.DNS' Signature Engine Lets Remote Users Deny Service
3248| [1020916] Mozilla Firefox JavaScript Layout Engine Memory Corruption Bugs May Let Remote Users Execute Arbitrary Code
3249| [1020849] Cisco Application Control Engine Predictable Source Port Address Translation May Leave DNS Servers Vulnerable to Recent Cache Poisoning Attack
3250| [1020635] Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks
3251| [1020606] Mac OS X Data Detectors Engine Resource Consumption Bug Lets Users Deny Service
3252| [1020520] Oracle WebLogic Apache Connector Lets Remote Users Execute Arbitrary Code
3253| [1020267] Apache mod_proxy Interim Response Process Bug Lets Remote Users Deny Service
3254| [1020181] Cisco ASA Bug in IM Inspection Engine Lets Remote Users Deny Service
3255| [1020180] Cisco PIX Firewall Bug in IM Inspection Engine Lets Remote Users Deny Service
3256| [1020074] Cisco Service Control Engine SSH Server Bugs Let Remote Users Deny Service
3257| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
3258| [1019986] Sun Java System Application Server Discloses JSP Source Code to Remote Users
3259| [1019985] Sun Java System Web Server Discloses JSP Source Code to Remote Users
3260| [1019894] IBM WebSphere Unspecified Flaw in Servlet Engine Has Unspecified Impact
3261| [1019830] Sun Grid Engine Bug in Qmaster Daemon Lets Local Users Deny Service
3262| [1019799] Windows VBScript and JScript Scripting Engine Bug Lets Remote Users Execute Arbitrary Code
3263| [1019784] Apache-SSL Certificate Processing Bug May Let Remote Users View Portions of Kernel Memory
3264| [1019695] Mozilla Firefox Bugs in JavaScript Engine and Layout Engine May Let Remote Users Execute Arbitrary Code
3265| [1019321] Mozilla Firefox Bugs in JavaScript Engine Let Remote Users Execute Arbitrary Code
3266| [1019320] Mozilla Firefox Bugs in Browser Engine Let Remote Users Execute Arbitrary Code
3267| [1019305] EMC Documentum 'dmclTrace.jsp' Bug Lets Remote Users Upload Arbitrary Files and Execute Arbitrary Code
3268| [1019256] Apache mod_negotiation Input Validation Hole Permits Cross-Site Scripting Attacks
3269| [1019194] Apache Input Validation Hole in Mod_AutoIndex When the Character Set is Undefined May Permit Cross-Site Scripting Attacks
3270| [1019185] Apache Input Validation Hole in mod_proxy_ftp Permits Cross-Site Scripting Attacks
3271| [1019154] Apache Input Validation Hole in mod_status Permits Cross-Site Scripting Attacks
3272| [1019093] Apache Input Validation Hole in mod_imap Permits Cross-Site Scripting Attacks
3273| [1019030] Apache Input Validation Hole in Default HTTP 413 Error Page Permits Cross-Site Scripting Attacks
3274| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
3275| [1018863] Trend Micro Scan Engine Buffer Overflow in 'Tmxpflt.sys' Lets Local Users Gain Elevated Privileges
3276| [1018633] Apache mod_proxy Bug Lets Remote Users Deny Service
3277| [1018452] Sun Java System Application Server Discloses JSP Source Code to Remote Users
3278| [1018408] Mozilla Firefox Bugs in Browser and Javascript Engines May Let Remote Users Execute Arbitrary Code
3279| [1018304] Apache HTTPD scoreboard Protection Flaw Lets Local Users Terminate Arbitrary Processes
3280| [1018303] Apache HTTPD mod_cache May Let Remote Users Deny Service
3281| [1018302] Apache mod_status Input Validation Hole Permits Cross-Site Scripting Attacks
3282| [1018269] Apache Tomcat Input Validation Hole in Processing Accept-Language Header Permits Cross-Site Scripting Attacks
3283| [1018245] Tomcat Input Validation Holes in the JSP Examples, Manager, and Host Manager Permit Cross-Site Scripting Attacks
3284| [1018153] Mozilla Seamonkey Bugs in Layout and Javascript Engines May Let Remote Users Execute Arbitrary Code
3285| [1018152] Mozilla Thunderbird Bugs in Javascript Engines May Let Remote Users Execute Arbitrary Code
3286| [1018151] Mozilla Firefox Bugs in Layout and Javascript Engines May Let Remote Users Execute Arbitrary Code
3287| [1017982] Trillian IRC and Display Engine Heap Overflows Let Remote Users Execute Arbitrary Code
3288| [1017960] Cisco NetFlow Collection Engine Default Passwords Let Remote Users Access the System
3289| [1017904] Apache suEXEC Bugs May Let Local Users Gain Elevated Privileges
3290| [1017719] Apache Tomcat JK Web Server Connector Buffer Overflow in map_uri_to_worker() Lets Remote Users Execute Arbitrary Code
3291| [1017698] Mozilla Firefox Memory Corruption in Layout Engine, SVG, and Javascript Engine May Let Remote Users Execute Arbitrary Code
3292| [1017506] BrightStor ARCserve Backup Bugs in Tape Engine, Mediasvr, and ASCORE.DLL Let Remote Users Execute Arbitrary Code
3293| [1017476] Kaspersky Anti-Virus Scanning Engine PE File Infinite Loop Lets Remote Users Deny Service
3294| [1017406] Mozilla Thunderbird Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code
3295| [1017405] Mozilla Seamonkey Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code
3296| [1017398] Mozilla Firefox Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code
3297| [1017268] BrightStor ARCserve Tape Engine Buffer Overflow Lets Remote Users Execute Arbitrary Code
3298| [1017179] Mozilla Firefox Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
3299| [1017178] Mozilla Thunderbird Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
3300| [1017177] Mozilla Seamonkey Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
3301| [1017062] Apache mod_tcl Format String Bug in set_var() Function May Let Remote Users Execute Arbitrary Code
3302| [1017026] Docmint Include File Flaw in 'MY_ENV[BASE_ENGINE_LOC]' Parameter Lets Remote Users Execute Arbitrary Code
3303| [1017006] CA Business Protection Suite Buffer Overflows in Backup Agent, Job Engine and Discovery Services Let Remote Users Execute Arbitrary Code
3304| [1017005] CA Server Protection Suite Buffer Overflows in Backup Agent, Job Engine and Discovery Services Let Remote Users Execute Arbitrary Code
3305| [1017004] BrightStor Enterprise Backup Buffer Overflows in Backup Agent, Job Engine and Discovery Services Let Remote Users Execute Arbitrary Code
3306| [1017003] BrightStor ARCserve Buffer Overflows in Backup Agent, Job Engine and Discovery Services Let Remote Users Execute Arbitrary Code
3307| [1016999] Symantec Scan Engine NAVEX15/NAVENG Device Drivers Let Local Users Gain Kernel Level Privileges
3308| [1016607] Sun N1 Grid Engine Buffer Overflows Let Local Users Shutdown the Grid Service or Gain Elevated Privileges
3309| [1016601] Apache mod_rewrite Off-by-one Error Lets Remote Users Execute Arbitrary Code
3310| [1016576] Apache Tomcat Discloses Directory Listings to Remote Users
3311| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
3312| [1016247] Sun Grid Engine CSP Flaws Let Local Denial of Service or Access the Grid Service
3313| [1016100] WebLogic JSP Compilation Error May Allow Remote Users to View JSP Source Code
3314| [1015974] Symantec Scan Engine Lets Remote Users Access the System and Download Files
3315| [1015965] CiscoWorks Wireless LAN Solution Engine Cross-Site Scripting Flaw Yields Administrative Privileges and Command Line Bug Lets Remote Authenticated Users Gain Shell Access
3316| [1015860] Doomsday Engine Format String Bugs in Con_Message() and Con_Printf() Let Remote Users Execute Arbitrary Code
3317| [1015837] Blazix Server Discloses JSP Source Code to Remote Users
3318| [1015835] Sun Grid Engine 'rsh' Bug Lets Local Users Obtain Root Privileges
3319| [1015823] Orion Application Server Discloses JSP Source Code to Remote Users
3320| [1015822] IBM Tivoli Business Systems Manager Input Validation Flaw in 'apwc_win_main.jsp' Permits Cross-Site Scripting Attacks
3321| [1015785] Veritas Backup Exec for Windows Servers Media Server Format String Bug in BENGINE May Let Remote Users Execute Arbitrary Code
3322| [1015779] Dwarf HTTP Server Discloses JSP Source Code and Permits Cross-Site Scripting Attacks
3323| [1015725] FTPoed Blog Engine Comment Section Input Validation Flaw Permits Cross-Site Scripting Attacks
3324| [1015576] KDE kpdf Heap Overflow in Splash Rasterizer Engine Lets Remote Users Execute Arbitrary Code
3325| [1015531] Grid Engine Bug in 'rsh' Lets Local Users Gain Elevated Privileges
3326| [1015512] KDE kjs Engine Buffer Overflow Lets Remote Users Execute Arbitrary Code
3327| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
3328| [1015447] Apache mod_ssl Null Pointer Dereference May Let Remote Users Deny Service
3329| [1015413] Spb Kiosk Engine Discloses Administrative Password to Local Users
3330| [1015344] Apache mod_imap Input Validation Flaw in Referer Field Lets Remote Users Conduct Cross-Site Scripting Attacks
3331| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
3332| [1015148] F-Prot Antivirus Lets Remote Users Bypass the Scanning Engine with Specially Crafted ZIP Files
3333| [1015093] Apache Memory Leak in MPM 'worker.c' Code May Let Remote Users Deny Service
3334| [1015047] Sun Java System Application Server May Disclose JSP Source Code to Remote Users
3335| [1015001] Symantec Anti Virus Scan Engine Buffer Overflow in Web Service Lets Remote Users Execute Arbitrary Code
3336| [1014996] ApacheTop Unsafe Temporary File May Let Local Users Gain Elevated Privileges
3337| [1014833] Apache ssl_hook_Access() Function May Fail to Verify Client Certificates
3338| [1014826] Apache Memory Leak in 'byterange filter' Lets Remote Users Deny Service
3339| [1014575] Apache mod_ssl Off-by-one Buffer Overflow in Processing CRLs May Let Remote Users Deny Service
3340| [1014488] Sophos Anti-Virus Engine Infinite Loop in Processing BZIP2 Archives Lets Remote Users Deny Service
3341| [1014323] Apache Chunked Transfer-Encoding and Content-Length Processing Lets Remote Users Smuggle HTTP Requests
3342| [1013743] Firefox Browser XPInstall Engine May Let Remote Users Execute Arbitrary Code
3343| [1013742] Mozilla Browser XPInstall Engine May Let Remote Users Execute Arbitrary Code
3344| [1013697] IBM WebSphere May Disclose JSP Source to Remote Users Sending Invalid Host Headers
3345| [1013361] Carsten's 3D Engine Format String Flaw Lets Remote Users Execute Arbitrary Code
3346| [1013156] Apache mod_python Publisher Handler Discloses Information to Remote Users
3347| [1012829] Apache mod_auth_radius radcpy() Integer Overflow Lets Remote Users Deny Service in Certain Cases
3348| [1012709] Owl Intranet Engine Has Unspecified Input Validation Holes That Permit SQL Injection and Cross-Site Scripting Attacks
3349| [1012420] Jakarta Lucene Input Validation Hole in 'results.jsp' Lets Remote Users Conduct Cross-Site Scripting Attacks
3350| [1012416] Apache on Apple OS X Lets Remote Users Bypass Apache File Handlers and Directly Access Files
3351| [1012415] Apache on Apple HFS+ Filesystems May Disclose '.DS_Store' Files to Remote Users
3352| [1012414] Apache mod_digest_apple Lets Remote Users Replay Authentication Credentials
3353| [1012344] Games Using the Serious Engine Can Be Crashed By Remote Users
3354| [1012313] JSPWiki Input Validation Hole in 'search.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
3355| [1012098] LithTech Engine Format String Bug Lets Remote Users Crash the Game Server
3356| [1012083] Apache Web Server Error in Processing Requests With Many Space Characters Lets Remote Users Deny Service
3357| [1011783] Apache mod_include Buffer Overflow Lets Local Users Execute Arbitrary Code
3358| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
3359| [1011557] Apache mod_ssl SSLCipherSuite Directive Can By Bypassed in Certain Cases
3360| [1011421] Web Wiz Internet Search Engine Discloses Database to Remote Users
3361| [1011385] Apache Satsify Directive Error May Let Remote Users Access Restricted Resources
3362| [1011340] Apache SSL Connection Abort State Error Lets Remote Users Deny Service
3363| [1011303] Apache ap_resolve_env() Buffer Overflow in Reading Configuration Files May Let Local Users Gain Elevated Privileges
3364| [1011299] Apache IPv6 Address Parsing Flaw May Let Remote Users Deny Service
3365| [1011248] Apache mod_dav LOCK Method Error May Let Remote Users Deny Service
3366| [1011213] Apache mod_ssl Can Be Crashed By Remote Users When Reverse Proxying SSL Connections
3367| [1010910] Cfengine Buffer Overflow in AuthenticationDialogue() Lets Remote Users Execute Arbitrary Code
3368| [1010717] mod_ssl Format String Error in 'ssl_engine_ext' May Let Remote Users Execute Arbitrary Code
3369| [1010674] Apache Can Be Crashed By PHP Code Invoking Nested Remote Sockets
3370| [1010619] NetScreen 5GT Input Validation Bug in Anti-Virus Engine Lets Remote Users Conduct Cross-Site Scripting Attacks
3371| [1010611] Juniper JUNOS Packet Forwarding Engine Can Be Crashed By IPv6 Packets
3372| [1010599] Apache httpd Header Line Memory Allocation Lets Remote Users Crash the Server
3373| [1010535] Unreal Game Engine Has Buffer Overflow in 'Secure' Query That May Let Remote Users Execute Arbitrary Code
3374| [1010462] Apache mod_proxy Buffer Overflow May Let Remote Users Execute Arbitrary Code
3375| [1010322] Apache mod_ssl Stack Overflow in ssl_util_uuencode_binary() May Let Remote Users Execute Arbitrary Code
3376| [1010270] cPanel Apache mod_phpsuexec Options Let Local Users Gain Elevated Privileges
3377| [1009934] Apache Web Server Has Buffer Overflow in ebcdic2ascii() on Older Processor Architectures
3378| [1009923] Unreal Game Engine UMOD '..\' Input Validation Flaw Lets Remote Users Overwrite Files on the Target System
3379| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
3380| [1009696] Wireless LAN Solution Engine (WLSE) Hardcoded User Account Grants Full Access to Remote Users
3381| [1009695] Cisco Hosting Solution Engine (HSE) Hardcoded User Account Grants Full Access to Remote Users
3382| [1009516] Apache mod_survey HTML Report Format Lets Remote Users Conduct Cross-Site Scripting Attacks
3383| [1009509] Apache mod_disk_cache Stores Authentication Credentials on Disk
3384| [1009495] Apache Web Server Socket Starvation Flaw May Let Remote Users Deny Service
3385| [1009417] GroupWise WebAccess With Apache on NetWare Has Configuration Flaw That May Grant Web Access to Remote Users
3386| [1009372] Unreal Game Engine Format String Flaw May Let Remote Users Execute Arbitrary Code
3387| [1009338] Apache mod_access Parsing Flaw May Fail to Enforce Allow/Deny Rules
3388| [1009337] Apache mod_ssl Memory Leak Lets Remote Users Crash the Daemon
3389| [1009296] SPAex Search Engine Input Validation Flaw Permits Cross-Site Scripting Attacks
3390| [1009182] Apache for Cygwin '..%5C' Input Validation Flaw Discloses Files to Remote Users
3391| [1009076] Symantec AntiVirus Scan Engine for Red Hat Linux Has Temporary File Flaws That May Yield Root Privileges to Local Users
3392| [1009003] Resin Web Server Discloses JSP Source Code to Remote Users
3393| [1008973] PHP May Apply Incorrect php_admin_* Settings To Requests for Apache Virtual Hosts
3394| [1008967] Apache-SSL 'SSLFakeBasicAuth' Lets Remote Users Forge Client Certificates to Be Authenticated
3395| [1008920] Apache mod_digest May Validate Replayed Client Responses
3396| [1008828] Apache mod_python String Processing Bug Still Lets Remote Users Crash the Web Server
3397| [1008822] Apache mod_perl File Descriptor Leak May Let Local Users Hijack the http and https Services
3398| [1008675] mod_auth_shadow Apache Module Authenticates Expired Passwords
3399| [1008559] Apache mod_php File Descriptor Leak May Let Local Users Hijack the https Service
3400| [1008335] Apache mod_python String Processing Bug Lets Remote Users Crash the Web Server
3401| [1008196] Apache 2.x on Windows May Return Unexpected Files For URLs Ending With Certain Characters
3402| [1008030] Apache mod_rewrite Contains a Buffer Overflow
3403| [1008029] Apache mod_alias Contains a Buffer Overflow
3404| [1008028] Apache mod_cgid May Disclose CGI Output to Another Client
3405| [1007995] Apache Cocoon Forms May Let Remote Users Execute Arbitrary Java Code on the System
3406| [1007993] Apache Cocoon 'view-source' Sample Script Discloses Files to Remote Users
3407| [1007955] Vivisimo Clustering Engine Input Validation Flaw Permits Remote Cross-Site Scripting Attacks
3408| [1007923] Wrensoft Zoom Search Engine Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks
3409| [1007823] Apache Web Server mod_cgi Error May Let Malicious CGI Scripts Crash the Web Service
3410| [1007817] Cfengine Buffer Overflow in 'cfservd' Lets Remote Users Execute Arbitrary Code
3411| [1007664] Apache::Gallery Unsafe Temporary Files May Let Local Users Gain Apache Web Server Privileges
3412| [1007557] Apache Web Server Does Not Filter Terminal Escape Sequences From Log Files
3413| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
3414| [1007230] Apache HTTP Server 'rotatelogs' Bug on Win32 and OS/2 May Cause the Logging to Stop
3415| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
3416| [1007146] Apache HTTP Server FTP Proxy Bug May Cause Denial of Service Conditions
3417| [1007145] Apache 'accept()' Errors May Cause Denial of Service Conditions
3418| [1007144] Apache Web Server 'type-map' File Error Permits Local Denial of Service Attacks
3419| [1007143] Apache 2.0 Web Server May Use a Weaker Encryption Implementation Than Specified in Some Cases
3420| [1006899] JBoss Application Server Discloses JSP Source Code to Remote Users
3421| [1006864] Apache Web Server Can Be Crashed By Remote Users Via mod_dav Flaws and Also Via Basic Authentication
3422| [1006858] Sun ONE Application Server Discloses JSP Source Code to Remote Users and Passwords to Local Users
3423| [1006763] Owl Intranet Engine 'browse.php' Script Fails to Authenticate Remote Users
3424| [1006723] Verilink (Polycom) NetEngine 6100-4 Router Can Be Crashed By Remote Users
3425| [1006709] Apache mod_survey Input Validation Flaw Lets Remote Users Fill Up Disk Space
3426| [1006614] Apache mod_ntlm Buffer Overflow and Format String Flaw Let Remote Users Execute Arbitary Code
3427| [1006591] Apache mod_access_referer Module Null Pointer Dereference May Faciliate Denial of Service Attacks
3428| [1006444] Apache 2.0 Web Server Line Feed Buffer Allocation Flaw Lets Remote Users Deny Service
3429| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
3430| [1006021] Apache Tomcat Server URL Parsing Error May Disclose Otherwise Inaccessible Web Directory Listings and Files to Remote Users
3431| [1005963] Apache Web Server 2.x Windows Device Access Flaw Lets Remote Users Crash the Server or Possibly Execute Arbitrary Code
3432| [1005962] Apache Web Server Path Parsing Flaw May Allow Remote Users to Execute Code in Certain Configurations
3433| [1005848] Apache 'printenv' Script Input Validation Bugs in Older Versions May Let Remote Users Conduct Cross-Site Scripting Attacks
3434| [1005765] Apache mod_jk Module Processing Bug When Used With Tomcat May Disclose Information to Remote Users or Crash
3435| [1005548] Apache mod_php Module May Allow Local Users to Gain Control of the Web Port
3436| [1005499] Apache Web Server (2.0.42) May Disclose CGI Source Code to Remote Users When Used With WebDAV
3437| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
3438| [1005351] Apache Web Server (1.3.x) Shared Memory Scoreboard Bug Lets Certain Local Users Issue Signals With Root Privileges
3439| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
3440| [1005331] Apache Web Server (2.x) SSI Server Signature Filtering Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
3441| [1005317] ASTAware SearchDisc Search Engine in SunONE Starter Kit Discloses Files to Remote Users
3442| [1005285] Apache Web Server 'mod_dav' Has Null Pointer Bug That May Allow Remote Users to Cause Denial of Service Conditions
3443| [1005135] Blazix Java Application Server Input Validation Hole Discloses JSP Source Code and Password-Protected Directory Listings to Remote Users
3444| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
3445| [1005049] Oracle 9i Application Server Oracle Java Server Page (OJSP) Demos Have Input Validation Flaws That Enable Remote Users to Conduct Cross-site Scripting Attacks Against Application Server Users
3446| [1005010] Apache Web Server (2.0) Has Unspecified Flaw That Allows Remote Users to Obtain Sensitive Data and Cause Denial of Service Conditions
3447| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
3448| [1004770] Apache 2.x Web Server ap_log_rerror() Function May Disclose Full Installation Path to Remote Users
3449| [1004745] Apache Tomcat Java Server Allows Cross-Site Scripting Attacks
3450| [1004743] Fluid Dynamics Search Engine Input Validation Bug in 'Rank' Variable Lets Remote Users Conduct Cross-site Scripting Attacks
3451| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
3452| [1004666] Macromedia JRun Server Bug in Processing Unicode Null Characters in URL Discloses JSP Source Code to Remote Users
3453| [1004661] ht://Dig Search Engine Software May Allow Cross-Site Scripting Attacks
3454| [1004636] Apache mod_ssl 'Off-by-One' Bug May Let Local Users Crash the Web Server or Possibly Execute Arbitrary Code
3455| [1004617] Verity Search97 Search Engine Input Validation Flaw Lets Remote Users Conduct Cross-site Scripting Attacks Against Users of Web Sites Running Search97
3456| [1004602] Apache Tomcat Java Server for Windows Can Be Crashed By Remote Users Sending Malicious Requests to Hang All Available Working Threads
3457| [1004586] Apache Tomcat Java Server May Disclose the Installation Path to Remote Users
3458| [1004579] Macromedia JRun Java Engine Can Be Crashed in a Multi-user Environment By One User's Malicious Code
3459| [1004555] Apache Web Server Chunked Encoding Flaw May Let Remote Users Execute Arbitrary Code on the Server
3460| [1004539] BODYBuilder Java-based Site Building Engine Input Validation Hole Lets Remote Users Execute Arbitrary SQL Commands on the Database
3461| [1004535] Macromedia ColdFusion May Let One User's JSP Code Gain Unauthorized Access to Another User's Data on a Shared Server
3462| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
3463| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
3464| [1004298] Cisco ACNS Content Software (Running on Cache Engines and Content Engines) May Let Remote Users Open Unauthorized Connections to Arbitrary Ports and Addresses
3465| [1004282] mnoGoSearch SQL-based Search Engine Software Has Heap Overflow That Lets Remote Users Execute Arbitrary Code with the Privileges of the Web Server
3466| [1004257] Ecometry's SGDynamo Web Application Engine Allows Remote Users to Conduct Cross-Site Scripting Attacks
3467| [1004219] Webglimpse Search Engine Filtering Flaw May Allow Remote Users to Conduct Cross-Site Scripting Attacks Against Users of Sites Running Webglimpse
3468| [1004209] Apache 'mod_python' Python Language Interpreter Bug in Publisher Handler May Allow Remote Users to Modify Files on the System
3469| [1004182] BEA Weblogic URL Parsing Flaw Lets Remote Users View .JSP Source Code or the Physical Installation Path and Cause Denial of Service Conditions
3470| [1004103] Linker Search Engine Software Has Input Validation Flaw That Lets Remote Users View Files on the System and Gain Administrative Access to the Search Engine
3471| [1004036] StepWeb Search (SWS) Perl-based Search Engine Inadequate Access Controls Lets Remote Users Gain Administrative Access to the Search Engine
3472| [1003921] WWWIsis Search Engine CGI Allows Remote Users to Execute Commands and View Files on the System
3473| [1003913] ht://Dig Search Engine Bug Lets Remote Users Determine the Configuration File Directory Path
3474| [1003900] csSearch Perl-based Search Engine Software Lets Remote Users Execute Arbitrary Perl Scripts on the System
3475| [1003874] Apache Web Server for Windows Has Batch File Processing Hole That Lets Remote Users Execute Commands on the System
3476| [1003767] 'mod_frontpage' Module for Apache Web Server Has Buffer Overlow in 'fpexec.c' That Allows Remote Users to Execute Arbitrary Code on the System with Root Privileges
3477| [1003739] Tomcat Java Server Lets Malicious Java Servlets or JSP Pages Access Any File on the Server
3478| [1003723] Apache-SSL for Apache Web Server Has Buffer Overflow That Can Be Triggered By Remote Users
3479| [1003664] 'mod_ssl' Security Package for Apache Web Server Has Buffer Overflow That Can Be Triggered By Remote Users
3480| [1003570] Lasso Web Data Engine May Allow Remote Users to Crash the Web Server
3481| [1003465] PHP for Apache Web Server May Disclose Installation Path Information to Remote Users Making 'OPTIONS' Requests
3482| [1003453] Oracle Application Server OracleJSP Flaw Discloses JSP Source Code Contents to Remote Users
3483| [1003451] Oracle Application Server PL/SQL Module for Apache Has Buffer Overflows That Allow Remote Users to Execute Arbitrary Code and Gain Access to the Server
3484| [1003368] AHG's 'search.cgi' Search Engine Input Validation Flaw Lets Remote Users Execute Arbitrary Commands on the Web Server
3485| [1003307] WikkiTikkiTavi PHP-based Wiki Engine Lets Remote Users Execute Arbitrary PHP Code on the Server
3486| [1003131] Apache Web Server in Virtual Hosting Mode Can Be Crashed By a Local User Removing a Log Directory
3487| [1003104] PHP.EXE Windows CGI for Apache Web Server May Let Remote Users View Files on the Server Due to Configuration Error
3488| [1003008] Apache 'mod_bf' Module Lets Remote Users Execute Arbitrary Code
3489| [1002984] Webglimpse Search Engine Software May Allow Remote Users to Execute Arbitrary Code on the Server
3490| [1002981] Namazu Search Engine Software Allows Cross-Site Scripting Attacks
3491| [1002838] Allaire's JRun Java Server Discloses JSP Source Code to Remote Users When Used As a Connector With Commercial Web Servers
3492| [1002837] Allaire JRun Java Server Discloses Web Server Directory Contents to Remote Users Requesting URLs Containing '%3f.jsp'
3493| [1002629] Apache suEXEC Wrapper Fails to Observe Minimum Group ID Security Settings in Certain Situations
3494| [1002542] Apache Web Server Virtual Hosting Split-Logfile Function Lets Remote Users Write Log Entries to Arbitrary Files on the System
3495| [1002525] ht://Dig Search Engine Software Has Remote Denial of Service and Local Information Disclosure Bugs in htsearch
3496| [1002423] Oracle Application Server Discloses Full Path to Remote Users in Response to Requests for Non-existent JSP Files
3497| [1002400] Apache mod_gzip Module Has Buffer Overflow That Can Be Exploited By Local Users to Gain Elevated Privileges
3498| [1002303] Several 3rd Party Apache Authentication Modules Allow Remote Users to Execute Arbitrary Code to Gain Access to the System or Execute Stored Procedures to Obtain Arbitrary Database Information
3499| [1002193] Macromedia JRun Java Server Discloses JSP Source Code to Remote Users
3500| [1002188] Apache Web Server Discloses Internal IP Addresses to Remote Users in Certain Configurations
3501| [1001989] Apache Web Server May Disclose Directory Contents Even If an Index.html File is Present in the Directory
3502| [1001915] LiteWebServer Discloses JSP Source Code to Remote Users
3503| [1001719] Apache Web Server on Mac OS X Client Fails to Enforce File and Directory Access Protections, Giving Remote Users Access to Restricted Pages
3504| [1001623] SpearHead's NetGAP Security Appliance Allows Remote Users to Bypass the Web Content Filtering Engine
3505| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
3506| [1001304] Apache Web Server for Windows Lets Remote Users Crash the Web Server Application
3507| [1001234] Resin Web Servlet and Java Engine Discloses JavaBean Contents to Remote Users
3508| [1001115] ASPSeek CGI-based Search Engine May Execute Arbitrary Code Supplied By Remote Users
3509| [1001083] Apache Web Server May Display Directory Index Listings Even if Directory Listings Are Disabled
3510| [1000942] Resin Web Servlet and Java Engine Allows Unauthorized Access to Directories and Files Outside of the Web Root Directory
3511|
3512| OSVDB - http://www.osvdb.org:
3513| [82782] Apache CXF WS-SecurityPolicy 1.1 SupportingToken Policy Bypass
3514| [90864] Apache Batik 1xx Redirect Script Origin Restriction Bypass
3515| [73550] Foxit Reader FreeType Engine Type 1 Font Decoder Overflow
3516| [6630] Apache Tomcat Java Server Pages (JSP) Engine WPrinterJob() DoS
3517|_
3518Service Info: Host: inversionistas.antarchile.cl
3519################################################################################################################################
3520 Anonymous JTSEC #OpChili Full Recon #77