· 6 years ago · Oct 24, 2019, 11:17 PM
1#######################################################################################################################################
2======================================================================================================================================
3Hostname www.citizensforthestcroixvalley.com ISP GoDaddy.com, LLC
4Continent North America Flag
5US
6Country United States Country Code US
7Region Arizona Local time 24 Oct 2019 14:58 MST
8City Scottsdale Postal Code 85260
9IP Address 160.153.136.3 Latitude 33.601
10 Longitude -111.887
11=======================================================================================================================================
12#####################################################################################################################################
13> www.citizensforthestcroixvalley.com
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18www.citizensforthestcroixvalley.com canonical name = citizensforthestcroixvalley.com.
19Name: citizensforthestcroixvalley.com
20Address: 160.153.136.3
21>
22#####################################################################################################################################
23 Domain Name: CITIZENSFORTHESTCROIXVALLEY.COM
24 Registry Domain ID: 2089903015_DOMAIN_COM-VRSN
25 Registrar WHOIS Server: whois.godaddy.com
26 Registrar URL: http://www.godaddy.com
27 Updated Date: 2018-12-14T12:48:41Z
28 Creation Date: 2017-01-13T22:16:05Z
29 Registry Expiry Date: 2020-01-13T22:16:05Z
30 Registrar: GoDaddy.com, LLC
31 Registrar IANA ID: 146
32 Registrar Abuse Contact Email: abuse@godaddy.com
33 Registrar Abuse Contact Phone: 480-624-2505
34 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
35 Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
36 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
37 Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
38 Name Server: NS49.DOMAINCONTROL.COM
39 Name Server: NS50.DOMAINCONTROL.COM
40#####################################################################################################################################
41Domain Name: citizensforthestcroixvalley.com
42Registry Domain ID: 2089903015_DOMAIN_COM-VRSN
43Registrar WHOIS Server: whois.godaddy.com
44Registrar URL: http://www.godaddy.com
45Updated Date: 2018-12-14T12:48:39Z
46Creation Date: 2017-01-13T22:16:05Z
47Registrar Registration Expiration Date: 2020-01-13T22:16:05Z
48Registrar: GoDaddy.com, LLC
49Registrar IANA ID: 146
50Registrar Abuse Contact Email: abuse@godaddy.com
51Registrar Abuse Contact Phone: +1.4806242505
52Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
53Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
54Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
55Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
56Registry Registrant ID: Not Available From Registry
57Registrant Name: Registration Private
58Registrant Organization: Domains By Proxy, LLC
59Registrant Street: DomainsByProxy.com
60Registrant Street: 14455 N. Hayden Road
61Registrant City: Scottsdale
62Registrant State/Province: Arizona
63Registrant Postal Code: 85260
64Registrant Country: US
65Registrant Phone: +1.4806242599
66Registrant Phone Ext:
67Registrant Fax: +1.4806242598
68Registrant Fax Ext:
69Registrant Email: citizensforthestcroixvalley.com@domainsbyproxy.com
70Registry Admin ID: Not Available From Registry
71Admin Name: Registration Private
72Admin Organization: Domains By Proxy, LLC
73Admin Street: DomainsByProxy.com
74Admin Street: 14455 N. Hayden Road
75Admin City: Scottsdale
76Admin State/Province: Arizona
77Admin Postal Code: 85260
78Admin Country: US
79Admin Phone: +1.4806242599
80Admin Phone Ext:
81Admin Fax: +1.4806242598
82Admin Fax Ext:
83Admin Email: citizensforthestcroixvalley.com@domainsbyproxy.com
84Registry Tech ID: Not Available From Registry
85Tech Name: Registration Private
86Tech Organization: Domains By Proxy, LLC
87Tech Street: DomainsByProxy.com
88Tech Street: 14455 N. Hayden Road
89Tech City: Scottsdale
90Tech State/Province: Arizona
91Tech Postal Code: 85260
92Tech Country: US
93Tech Phone: +1.4806242599
94Tech Phone Ext:
95Tech Fax: +1.4806242598
96Tech Fax Ext:
97Tech Email: citizensforthestcroixvalley.com@domainsbyproxy.com
98Name Server: NS49.DOMAINCONTROL.COM
99Name Server: NS50.DOMAINCONTROL.COM
100DNSSEC: unsigned
101######################################################################################################################################
102[+] Target : www.citizensforthestcroixvalley.com
103
104[+] IP Address : 160.153.136.3
105
106[+] Headers :
107
108[+] Link : <https://www.citizensforthestcroixvalley.com/site.css?v=>; rel=preload; as=style,<https://fonts.googleapis.com>; rel=preconnect; crossorigin,<https://fonts.gstatic.com>; rel=preconnect; crossorigin,<https://img1.wsimg.com>; rel=preconnect; crossorigin,<https://img2.wsimg.com>; rel=preconnect; crossorigin,<https://img4.wsimg.com>; rel=preconnect; crossorigin,<https://nebula.wsimg.com>; rel=preconnect; crossorigin
109[+] Cache-Control : public, max-age=60, s-maxage=300
110[+] Content-Security-Policy : frame-ancestors 'self'
111[+] Content-Type : text/html; charset=utf-8
112[+] Vary : Accept-Encoding
113[+] Content-Encoding : gzip
114[+] Server : DPS/1.6.13
115[+] X-SiteId : 4000
116[+] Set-Cookie : dps_site_id=4000; path=/; secure
117[+] ETag : cf9d0bc403007a25332707e4faff7c69
118[+] Date : Thu, 24 Oct 2019 22:04:51 GMT
119[+] Connection : keep-alive
120[+] Transfer-Encoding : chunked
121
122[+] SSL Certificate Information :
123
124[+] organizationalUnitName : Domain Control Validated
125[+] commonName : citizensforthestcroixvalley.com
126[+] countryName : US
127[+] stateOrProvinceName : Arizona
128[+] localityName : Scottsdale
129[+] organizationName : GoDaddy.com, Inc.
130[+] organizationalUnitName : http://certs.godaddy.com/repository/
131[+] commonName : Go Daddy Secure Certificate Authority - G2
132[+] Version : 3
133[+] Serial Number : 5791BB659D56AB2A
134[+] Not Before : Mar 22 16:27:01 2018 GMT
135[+] Not After : Mar 22 16:27:01 2020 GMT
136[+] OCSP : ('http://ocsp.godaddy.com/',)
137[+] subject Alt Name : (('DNS', 'citizensforthestcroixvalley.com'), ('DNS', 'www.citizensforthestcroixvalley.com'))
138[+] CA Issuers : ('http://certificates.godaddy.com/repository/gdig2.crt',)
139[+] CRL Distribution Points : ('http://crl.godaddy.com/gdig2s1-817.crl',)
140
141[+] Whois Lookup :
142
143[+] NIR : None
144[+] ASN Registry : arin
145[+] ASN : 26496
146[+] ASN CIDR : 160.153.136.0/22
147[+] ASN Country Code : US
148[+] ASN Date : 2011-09-01
149[+] ASN Description : AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US
150[+] cidr : 160.153.0.0/16
151[+] name : GO-DADDY-COM-LLC
152[+] handle : NET-160-153-0-0-1
153[+] range : 160.153.0.0 - 160.153.255.255
154[+] description : GoDaddy.com, LLC
155[+] country : US
156[+] state : AZ
157[+] city : Scottsdale
158[+] address : 14455 N Hayden Road
159Suite 226
160[+] postal_code : 85260
161[+] emails : ['abuse@godaddy.com', 'noc@godaddy.com']
162[+] created : 2011-08-31
163[+] updated : 2014-02-25
164
165[+] Crawling Target...
166
167[+] Looking for robots.txt........[ Found ]
168[+] Extracting robots Links.......[ 15 ]
169[+] Looking for sitemap.xml.......[ Found ]
170[+] Extracting sitemap Links......[ 2 ]
171[+] Extracting CSS Links..........[ 2 ]
172[+] Extracting Javascript Links...[ 2 ]
173[+] Extracting Internal Links.....[ 0 ]
174[+] Extracting External Links.....[ 104 ]
175[+] Extracting Images.............[ 5 ]
176
177[+] Total Links Extracted : 130
178
179[+] Dumping Links in /opt/FinalRecon/dumps/www.citizensforthestcroixvalley.com.dump
180[+] Completed!
181#####################################################################################################################################
182[+] Starting At 2019-10-24 18:06:06.955353
183[+] Collecting Information On: https://www.citizensforthestcroixvalley.com/
184[#] Status: 200
185--------------------------------------------------
186[#] Web Server Detected: DPS/1.6.13
187[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
188- Link: <https://www.citizensforthestcroixvalley.com/site.css?v=>; rel=preload; as=style,<https://fonts.googleapis.com>; rel=preconnect; crossorigin,<https://fonts.gstatic.com>; rel=preconnect; crossorigin,<https://img1.wsimg.com>; rel=preconnect; crossorigin,<https://img2.wsimg.com>; rel=preconnect; crossorigin,<https://img4.wsimg.com>; rel=preconnect; crossorigin,<https://nebula.wsimg.com>; rel=preconnect; crossorigin
189- Cache-Control: public, max-age=60, s-maxage=300
190- Content-Security-Policy: frame-ancestors 'self'
191- Content-Type: text/html; charset=utf-8
192- Vary: Accept-Encoding
193- Content-Encoding: gzip
194- Server: DPS/1.6.13
195- X-SiteId: 4000
196- Set-Cookie: dps_site_id=4000; path=/; secure
197- ETag: cf9d0bc403007a25332707e4faff7c69
198- Date: Thu, 24 Oct 2019 22:06:08 GMT
199- Connection: keep-alive
200- Transfer-Encoding: chunked
201--------------------------------------------------
202[#] Finding Location..!
203[#] status: success
204[#] country: Netherlands
205[#] countryCode: NL
206[#] region: NH
207[#] regionName: North Holland
208[#] city: Amsterdam
209[#] zip: 1012
210[#] lat: 52.3702
211[#] lon: 4.89517
212[#] timezone: Europe/Amsterdam
213[#] isp: GoDaddy.com, LLC
214[#] org: GoDaddy.com, LLC
215[#] as: AS26496 GoDaddy.com, LLC
216[#] query: 160.153.136.3
217--------------------------------------------------
218[x] Didn't Detect WAF Presence on: https://www.citizensforthestcroixvalley.com/
219--------------------------------------------------
220[#] Starting Reverse DNS
221[!] Found 1000 any Domain
222- 00k9.com
223- 1000mothers.org
224- 100prooftattoo.com
225- 107auctionblock.com
226- 109howard.com
227- 1180wfyl.com
228- 123deliveryservices.com
229- 12oclocklevel.com
230- 13thintconflimbdevregen.com
231- 156metal.com
232- 16ways.org
233- 1nailsalon.com
234- 1nationalexec.com
235- 1nightstandstl.com
236- 1stlutheranchurch.org
237- 1stmaple.org
238- 1timefence.com
239- 205westwacker.com
240- 206photography.com
241- 24-7towtruckservice.com
242- 2gs.me
243- 2jsoap.com
244- 39gorkhas.com
245- 3horsespaydirts.com
246- 401ads.com
247- 4cbbq.com
248- 5skate.com
249- 601protech.com
250- 7111317192329.com
251- 7dayhealth.com
252- a-1base.com
253- a1escortsinpune.com
254- a1mconsulting.co.uk
255- a1oshasafety.com
256- a1signworks.com
257- a1southerntrappers.com
258- aardvarkpestsolutionsllc.com
259- aarvaa.com
260- abandoforcs.com
261- abhinavtechcorp.com
262- abigaillaurentravel.com
263- abingtonhandymanservices.com
264- abinstallations.com.au
265- abrandtfineart.com
266- abroadwaysmile.com
267- acbouquets.com
268- accentpowdercoating.com
269- acreen.net
270- adaptivecloudnet.com
271- addabrewpub.com
272- adrienneeichner.com
273- adsx.com
274- advancedjourneychauffeuring.co.uk
275- advancedperfusion.com
276- advbiz.com
277- affymax.com
278- aflatoonz.com
279- afreechatline.com
280- agewithgraceseniorcare.com
281- agnursery.com
282- ahillsmc.com
283- aikidoofnorthampton.org
284- airtestingsw.com
285- airwolfenergy.com
286- aitstravel.com
287- akashshukla.in
288- akawardogs.net
289- akelco.com.ph
290- albrittoncustomcarpentry.com
291- alduwaliya.com
292- alecrodriguez.com
293- alexitalianrestaurant.com
294- alfacomputer.in
295- alfaizelectric.com
296- alfordburkhart.com
297- all-absorb.com
298- all4cars.co.uk
299- alleyabstract.com
300- allhomeservices.co
301- allmightyaffiliates.com
302- allseasonsfirewoods.com
303- alohagentleenergy.com
304- alpamayo.cl
305- altamiradeco.com
306- alternus-capital.com
307- alxandrphoto.com
308- amckean.com
309- americangemologicalappraisal.com
310- americanpizzapattaya.com
311- amochange.com
312- amormn.com
313- amoselectrical.co.uk
314- amptrailers.com
315- amritatravels.in
316- amygreenhealthcarerecruiting.com
317- anabellebryant.com
318- anallies-this.com
319- anaturalallure.com
320- anchormarineinc.net
321- anchorrarecoins.com
322- andtelevision.com
323- anexonel.com
324- angelaboyddyson.com
325- angelscript.com
326- angieslinks.com
327- animalsinneedri.com
328- aniplazahotel.am
329- anjum.co.in
330- ankitakundu.com
331- annafaithxoxo.com
332- annfrank.net
333- antarveditourism.com
334- antihangover.com
335- antinorodocs.com
336- anumalkin.com
337- anuriti.com
338- apastmemory.com
339- appinratlam.com
340- appsport.com
341- apurvadentalcare.com
342- arbitrageshub.net
343- arizonanaturalmedicalcenter.com
344- arjunarchana.com
345- arquiview.com
346- arshaknazarian.com
347- asimant.cl
348- asphaltsitework.com
349- astucefifa17fr.com
350- asylumskatepark.co.uk
351- ataxadvisor.com
352- atlasexcavating.com
353- atomix.com
354- atticarch.com
355- attorneytonywadhawan.com
356- atyourrequestdj.net
357- auntiemaescafe.com
358- auralearmt.com
359- austincoc.com
360- autobodyworkscollision.com
361- autodiagalgerie.com
362- automotivetestdrivers.com
363- autumnbriphotography.com
364- averityteam.com
365- avonleashea.com
366- azbeekeepers.org
367- azcpoa.org
368- bacaresevilla.com
369- balancefindyourcenter.com
370- ballparkent.com
371- bandahuellas.cl
372- bandc4.net
373- bandlergroup.com
374- bangalorebusiness.com
375- banterandbet.net
376- barbaresconcrete.com
377- barnbuiltcaferacer.com
378- batterymasters.com
379- beacondlites.com
380- bebparcodelbrik.com
381- beehiveconcretepumping.com
382- beewired.co.uk
383- bellingarpacking.com
384- bergmanlawfirm.net
385- berlinica.com
386- bernardobeiriz.com
387- berniefacts.com
388- bestattorneysofamerica.com
389- bestfriendsofbaker.org
390- bestinrenovation.com
391- bestlosangelesmattresssale.com
392- betafulmind.com
393- beveragestockreview.com
394- beydabilgisayar.com
395- beyondvacations.in
396- bhaibrothers.com
397- bigbasschallengecanada.com
398- bigbearspecialevents.com
399- biocidejansan.com
400- bioonega.com
401- bioonejacksonville.com
402- birgonul.org
403- bitdoublebtc.com
404- bizconfo.com
405- bizprofit.net
406- bizshotz360.com
407- blankbanshee.com
408- blizzfiles.com
409- bluewhalefunding.com
410- bobbystromfitness.com
411- bobliekens.com
412- bodyrubschicago.com
413- bohemiananchor.com
414- borsteinsheinbaum.com
415- bounceonpueblo.com
416- brandonchao.com
417- brcowboychurch.org
418- brevardfun.com
419- briajungwirth.com
420- brianhalstead.net
421- brickadvantage.com
422- bridgesdvc.org
423- brighten.ai
424- brinsured.com
425- bro23.com
426- browardski.com
427- bruusa.com
428- buddyblackattack.com
429- buildingstore.cl
430- bulksms2mobile.co.in
431- bullshirepolice.com
432- cabinetplace.net
433- cableliquidator.com
434- cablesmashers.com
435- cabsecgovt.in
436- cainelectricstl.com
437- californiahomeschoolsports.com
438- callsupportline.com
439- canadianonshore.com
440- canar.net
441- candoo.club
442- cannon.pe
443- canoraweaving.com
444- capitolomaha.com
445- carsontechgroup.com
446- casamiaservices.com
447- casanovainfo.com
448- casoconstruction.com
449- catersolar.com
450- cbd-canada.net
451- ccmotorcycletraining.com
452- centrestar.ca
453- ceragence.com
454- cetinarik.org
455- cghub.com
456- cgl-worldwide.com
457- champsforchildren.com
458- chapmansupplies.ca
459- chelseafw.com
460- chelseahewittphotography.com
461- chemchasers.com
462- chennaifurniture.net
463- chennaiorganicfarm.com
464- chesapeakespeedskating.com
465- chesterfieldfamilydentistry.com
466- chesterlimonj.com
467- chickenfiesta.com
468- chihebspoiledboy.com
469- chinanet.com
470- chocohouse.biz
471- chriscoylandscapes.com
472- chriskerfootpainteranddecorator.co.uk
473- christianleievents.com
474- christinefanderson.com
475- christinein16.com
476- christineproiasdance.com
477- cignaltv.ph
478- cinnamonsorganizing.com
479- ciprian-ciubotariu.com
480- citizensforthestcroixvalley.com
481- ckwoodworking.com
482- claros.com
483- clashroyalehackcheats.com
484- click9999.com
485- clinicavidanimal.cl
486- clinusa.com
487- cloverleafcloud.com
488- cmldigital.com.mx
489- coalitionforqualitypubliceducation.com
490- colchesterremovals.co
491- collegiatesmg.com
492- collinghamchambers.com
493- collinsproscapes.com
494- comiskeyresearch.com
495- comparefroggy.com
496- comparemypremiums.com
497- comradeayatollah.org
498- constableclintburgess.com
499- construtoramilao.com
500- consultip.godaddysites.com
501- copperleafeventcenter.com
502- copskc.com
503- corporateinsight.biz
504- cottontailindustries.com
505- covertlogistics.com
506- cpli.com
507- cpqgvnlt.com
508- creativeeducationfoundation.org
509- croxdaleinn.co.uk
510- crucontractors.co.uk
511- cruisepark.com
512- crystalbluediving.com
513- crystalrootsec.com
514- ctdstaffing.com
515- ctrust.ca
516- cuddlr.mobi
517- culpepper-club.com
518- cursosdeexcel.com.mx
519- custommen.com
520- cwicrane.com
521- cyberhawkwsa.com
522- daaceswild.com
523- danaabukhader.com
524- danaalotaibi.com
525- dancetonightatlanta.com
526- dangreenblatt.info
527- danterestorations.com
528- datacity.ca
529- datamarketindia.com
530- davispattesting.co.uk
531- dawnwillow.com
532- dccamerica.com
533- dcunlimited.co
534- deepakdahiya.in
535- defb.org
536- delawarevalleyhomemaintenance.com
537- delicatetips.com
538- deltaglobal.com
539- depor13news.com
540- dermotmurnaghan.com
541- desketing.com.au
542- destecheng.com
543- dgacapitalmanagement.com
544- dgeconsulting.cl
545- dgkw.com
546- dhanus.cl
547- digg.comwww.cantonmuseum.org
548- digicurb.com
549- digitalflex.in
550- dimapurpolice.in
551- dimensiontrust.cl
552- directnet.biz
553- distinguishedpaintingcontractor.com
554- divfingrp.com
555- divinecabinets.com
556- divinecaddesign.com
557- dj-homes.com
558- dnaconsultores.cl
559- docksidepower.com
560- dosaplace.in
561- dotmisr.com
562- dreamawayresorts.com
563- dreyandvic.com
564- drskiskids.com
565- drsoot.co.uk
566- drytimerestoration.com
567- drywall911.com
568- dtcfamilyhealth.com
569- dteamnetwork.com
570- duoseg.com
571- e-varmis.com
572- ealar.org
573- easingpaw.com
574- eastasiawine.com
575- eastcoastmoviehorses.com
576- eastlouisvilletreeservice.com
577- eastplat.com
578- easynetkerala.com
579- ecmne.com
580- economicfrauds.tv
581- edephoto.com
582- edgewaterenergysc.com
583- edmunsonelectric.com
584- edwardslegaloffice.com
585- eeea.com
586- electricalgenerators.co.uk
587- eleganthomesoftexas.com
588- elfisannidhi.com
589- elisadeath.com
590- eliteautopartsaz.com
591- elitelashstudioaz.com
592- elliscountymartialarts.com
593- elpasohomestexas.com
594- emailabilities.com
595- emanuelcristiancaraman.com
596- emilija1x2.com
597- emilybaoapps.com
598- emirhanguenebakan.com
599- emporiumhairdesigns.com
600- emprendenow.com
601- emrconsultants.com
602- encoreatlanticshoreshoa.com
603- engineerindya.com
604- enlighteningstreams.com
605- enterthecode.in
606- enviadetalle.com
607- eons.com
608- epsdepot.com
609- epyloc.com
610- erikbohlingportfolio.com
611- escapetanandspa.com
612- esselworldlive.in
613- evergreentattoo.com
614- evilagent.com
615- exceedevents.com
616- exmla.com
617- expertstv.com
618- explorer.net
619- expo-pros.com
620- extremepromoting.com
621- eyecandyagency.co.uk
622- eyecandyescort.com
623- falcaogeldimi.com
624- falcohomeimprovements.com.au
625- farmhopethrive.org
626- fast8ballpoolhack.com
627- fastdent.com
628- fenceconsultantsofwashington.com
629- finaconstruction.ca
630- finedine.com.au
631- firstchoicecustomcabinetsllc.com
632- firstposition.cl
633- fkunpadfair.com
634- flmanagementllc.com
635- floridahuntingoutfitter.com
636- flowtechnics.com
637- foltzlawphilly.com
638- foodtruck.com
639- footballpromotions.co.uk
640- footlooseasia.com
641- fortconstructionllc.com
642- free4you.co.uk
643- freedeals.com
644- freedomsolutionsmo.com
645- freeredouan.com
646- fryandpie.com
647- ftp.rugenteam.com
648- fullforcecontracting.net
649- fullstack.com
650- furabodyworks.com
651- fusionsalonnyc.com
652- futurebrightllc.com
653- ga15.info
654- gaganpalacenj.com
655- gainzsupplements.com
656- gama.com
657- gaugeguys.com
658- gaymix365.com
659- geallencastings.co.uk
660- getrealusainc.com
661- getyou.com
662- ggrea.com
663- giftiliciouscards.in
664- girlfridayhull.co.uk
665- givetech.in
666- glassdesignsplus.com
667- glassspecialistsinc.com
668- globaldmsolutions.com
669- globecr.com
670- globestreet.com
671- glossycleaners.com
672- gnselectrical.com
673- goglobalgap.com
674- gogoulet.com
675- goodshepherdpublicschool.in
676- gotascratch.com
677- gotitya.com
678- gpwannabe.com
679- gregoryformissouri.com
680- gregsruntownsend.com
681- griadamlar.com
682- griffithhomeinspection.com
683- grizzlybattle.com
684- gspotautoworks.com
685- gurmevyemekleri.com
686- gurulz.com
687- gururaghavendramatrimony.com
688- gvsigns.ca
689- gymnasiumsf.com
690- handsland.com
691- hanuminteriors.com
692- happiewedding.com
693- happizone.com
694- happyrecharge.info
695- harthomes.us
696- hearttoheartromania.com
697- henrongindustrial.com
698- hescom.in
699- hetroublemaker.me
700- hetzellawoffice.com
701- heytheremorgan.com
702- hfashion.me
703- hhdresearch.com
704- hiddendraftsman.com
705- hidraulicacgchile.cl
706- highcottonhomes.com
707- highlifeasiaweddings.com
708- highstonereflexology.com
709- hilltopsolutions.co.uk
710- hkflavorslimited.com
711- hm-electric.net
712- homecare4eva.co.uk
713- homecomfortsystems.com
714- homelandprotectionservice.com
715- hoododat.com
716- horizon-hosting.co.uk
717- horstschulzeconsulting.com
718- hotelwoodlands.in
719- housetohomeimprovements.com
720- hunterscafesweetwatertn.com
721- hypnotherapistsomerset.com
722- iamdytto.com
723- ibetyoucanbet.com
724- id-queue.com
725- idealimageoc.com
726- idealmedbilling.com
727- idemcevre.com
728- identian.co
729- iheartpaps.org
730- iheesoo.info
731- ihmscanada.com
732- ilikewashington.com
733- imagepix.com
734- imattress.com
735- imperiumlender.com
736- imphysiotherapy.com
737- inceptiontoday.com
738- incsoltech.com
739- industry-platform.com
740- infinitystockpicks.com
741- inglobalservicios.cl
742- innovaterecords.com
743- inpressmedia.net
744- inservic.cl
745- insinc.solutions
746- instakipcin.com
747- interiorsdesignedtx.com
748- internationalwholeseller.com
749- intriguejewelers.net
750- iocircle.com
751- ipcopyright.com
752- iranians4peace.org
753- isccc.org
754- isis-solution.com
755- istanbul-kamera.com
756- isupportbehaviour.com
757- itctool.com
758- itech-learning.com
759- jacksonanthony.co.uk
760- jaguarteam.net
761- jamescolton.co.uk
762- jasmine-thaicuisine.com
763- jasongesing.com
764- jaynagar.in
765- jazzuresorts.com
766- jbandf.com
767- jccaltime.com
768- jcrtechnology.com
769- jcwinn.com
770- jdl.org
771- jdmoling.co.uk
772- jeffmorneau.com
773- jenniferfalk.net
774- jenniferjonesstyling.com
775- jessicapeterson.net
776- ji-cheng.co
777- jjdiamondcleaning.com
778- jlengineering.us
779- jmps.org.in
780- jnanakshi.org
781- joanbeckerlaw.com
782- johnebakerphd.com
783- johnlillie.com
784- jomycaldito.com
785- joshuadobkins.com
786- jrhardwoodfloors.com
787- jrwptruckaccessories.ca
788- justblaze.com
789- justinbloyer.com
790- kalagifts.com
791- kamas-shop.net
792- kamera-sistemleri.co
793- kanevpools.com
794- kannephotographie.com
795- kashmirclick.com
796- katalysttech.com
797- katherine.xxx
798- katiessalon.com
799- katyakandinsky.com
800- kcrp.net
801- kedarhairinc.com
802- keeng.co
803- kellen.com
804- kettlesandgrains.com
805- keyadvisors.cl
806- keystonebusinessconcepts.com
807- khamesalkhanjar.com
808- killelea.net
809- kingscourtgowns.com
810- kingstonpetsitting.com
811- kiralikhackers.com
812- kkkknights.com
813- knowila.com
814- konabbqgrillmat.com
815- kord.com
816- kouroshmi.org
817- kushlyaffiliates.com
818- kuwaittravelexpo.com
819- labicicletasolidaria.cl
820- laexoticsllc.com
821- lakeviewglass.org
822- lamplighterinnclearlake.com
823- latinosfortrump.us
824- laurenalexisshop.com
825- lavozradio.info
826- lawyerinhurghada.com
827- ld-max.com
828- leaders.fitness
829- ledqusa.com
830- leeyastudio.com
831- legendprofile.com
832- legendsplays.com
833- legendsred.com
834- lemongrasshousethailand.com
835- leonhandymanservices.com
836- lessonmy.com
837- level-seven.net
838- leyruta.org
839- lgj.is
840- lifeunleashedacademy.com
841- liftxtense.com
842- limpiezasuperior.cl
843- littlepeoplehawaii.com
844- livetechplus.com
845- loanfundingpros.com
846- localchiromarketing.com
847- localsingles.dating
848- logic-dimensions.com
849- logicaccountshub.com
850- lookatthis.ca
851- loschercheros.com
852- louisrocco.com
853- lovio.co
854- lpathi.com
855- luckieslounge.com
856- luxurylightingandshades.com
857- luxyfan.com
858- lvginc.com
859- lyngift.com
860- magicprofiles.com
861- mail.perfectbosses.com
862- mailhelplol.com
863- mainordlaw.com
864- malloytranscription.com
865- manageitservices.com.au
866- manasa.net.in
867- manhattantms.com
868- mannaplusghana.com
869- manpasandchicago.com
870- mappriceprotection.com
871- markdentalclinic.com
872- martinzarzar.com
873- mash.net
874- masis.org.uk
875- massagecricket.com
876- maxwellandco.net
877- mayahealthinstitute.com
878- mayarcapital.com
879- mcbupdates.com
880- mccn.org
881- mcgintysautoparts.com
882- mcintoshmarketing.biz
883- meadecpa.com
884- medinaguides.com
885- medwinmedicalcenter.com
886- medyumonur.com
887- meghanhardin.com
888- menpoppingtoys.com
889- messagesfromtheangels3.com
890- metalmorphosisdesigns.com
891- meucreditoimoveis.com.br
892- michaelsalem.com
893- michtelco.com
894- mideasttimes.com
895- midnightpm.com
896- mikesprayandsons.co.uk
897- milesbettermedia.com
898- minecraftadresi.com
899- mirshafieilawoffice.com
900- misotroliquique.cl
901- mistresscarol.com
902- mitchellfarm.org
903- mizure.com
904- mmrecharge.com
905- mobile-massage-therapist-london.com
906- moh-lawyer.com
907- momstattoosf.com
908- monicapattonforever.com
909- monsourlawfirm.com
910- montanamac.net
911- montanawild.com
912- mosorsisi.com
913- movingestimates.co
914- movingfirefighter.com
915- mowbetter.net
916- mrdoor.com
917- mrmpoint.com
918- mrsaccidentalmoe.com
919- msdrehouseofshoes.com
920- mtncm.com
921- multiarmazem.com.br
922- multytrade.com
923- munchiesnaturalpetfoods.com
924- mydz.co
925- myeternalart.com
926- myfedloaninfo.org
927- myhomepageguru.com
928- mykennedyhouse.com
929- mynumberbook.com
930- nailartboutiquenyc.com
931- nakedmouse.com
932- nallamittai.com
933- nancykriseman.com
934- nanosistemleri.com
935- narangmandi.com
936- nationalistwomensfront.org
937- nativoinglesbrasilia.com.br
938- nawrasalhalabi.com
939- nc-consultores.cl
940- ncoct.com
941- negativepublicrelations.com
942- netacy.com
943- nettiebay.com
944- newhomesrutherford.com
945- newhousehunters.net
946- newvacancy.com
947- newyorkarchivalprints.com
948- ngrprices.com
949- nicenia.com
950- nickleisgoingunion.com
951- nirmalaenterprise.com
952- noajm.com
953- non-stopgaming.com
954- norcalcrushacademy.com
955- northpointpainting.com
956- nortonhelpline.com
957- nuevodesign.ca
958- nunn-associates.com
959- nurol.cl
960- nurturingnation.org
961- nutrymas.cl
962- nybetsonline.com
963- nyclaserdentist.com
964- o-ghost-hacker.com
965- oasisol.com
966- oceanislefishco.com
967- oceanstatetickcontrol.com
968- oilfieldtls.com
969- okanogannotaryservice.com
970- ola.com
971- oldfashionedfarmersdays.com
972- oluebodacpa.com
973- onedeal4all.com
974- onepay.com
975- onlineprofitjobs.com
976- onukotha.com
977- oopsibabyusa.com
978- optiumcapital.com
979- orangecountyseowebdesign.com
980- orangecrestwolves.org
981- oss-online.com
982- ouramericainitiative.com
983- outlanderthrills.in
984- outreachdallas.org
985- ozasyainsaat.com
986- pacificcoastcoin.com
987- pack401.com
988- pack998.com
989- paintthestarsphoto.com
990- palletfest.com
991- palomafortrump.com
992- panaceainc.co.in
993- pandyalaw.com
994- pantalent.com
995- papaspizzaalaska.com
996- parakeat.com
997- parfummekani.net
998- pasound.com
999- patapp.com
1000- pathwaysccs.org
1001- patriotwatchmedia.com
1002- pay168bet.com
1003- paymentsolutionbd.com
1004- paystubgroup.com
1005- pcnetworx.com
1006- pdav.net
1007- peakmso1.com
1008- pennystockextreme.com
1009- perfectfordad.com
1010- petesshursavmarkets.com
1011- pettraders.com
1012- pharslp.com.mx
1013- philpenrose.com
1014- phoenixgym.in
1015- phoenixtherapy.org.uk
1016- piquepoloshirts.com
1017- planetfry.co
1018- planetrackerchicago.com
1019- planoequalrights.com
1020- playerswap.com
1021- poetryclub.com
1022- polarforcecreative.com
1023- pornsite007.com
1024- powermtasolution.com
1025- poweruptec.com
1026- preciousslut.net
1027- predatoroptics.com
1028- prerolledcones.ca
1029- princesspinky.org
1030- printingplusus.com
1031- pro-venttech.com
1032- prontospanish.com
1033- protectingscvalues.com
1034- psiconciencia.com
1035- psychicloverituals.com
1036- publishwithcfa.com
1037- puntonsivanhoe.com.au
1038- purehcs.co.uk
1039- q-flexfitness.com
1040- qmm1.com
1041- qproofs.com
1042- qualityairandcarpet.com
1043- quickpicklekit.com
1044- quinnlaw.us
1045- r-engineering.net
1046- r3automation.com
1047- rabows.com
1048- radiobahiapuerto.com
1049- rainbot.xyz
1050- raithbyhall.com
1051- raleighprimarycare.com
1052- rdcconstruction.com
1053- realmadridismylife.com
1054- reclaim-australia.com
1055- redhousecomputers.biz
1056- refruitme.co.uk
1057- reidcleaning.co.uk
1058- relentlesscarpentry.com
1059- remazika.co
1060- remoteserviceagents.com
1061- renfamous.com
1062- rentaphotobooth.ca
1063- republicanvoterstx.com
1064- restackstudios.com
1065- rewardpoint.co.uk
1066- right-path.co.uk
1067- rigworxinc.com
1068- riohoteldubai.com
1069- ritarivers.com
1070- riverviewinsurancesolutions.com
1071- ro-bel.com
1072- roadbuilderssupply.com
1073- robertfl.com
1074- robot20.net
1075- rockettelecommunications.com
1076- rocketwealth.com
1077- rockinghamstudio.com
1078- romanticreveals.com
1079- room.red
1080- roraima.cl
1081- route66goldenshores.com
1082- rsicarolina.com
1083- ruthgenevieve.com
1084- sacredmystics.com
1085- sacredsoulstone.com
1086- sadisticsoulsmc.org
1087- safemontana.com
1088- safesurfing.co
1089- safeswimmingschool.com
1090- sajidkiani.me
1091- salco-sa.com
1092- salleepromotions.com
1093- salonmanufacturing.com
1094- sammoogym.ca
1095- santabarbaratraining.com
1096- santacruzaleworks.com
1097- satfire.com
1098- satinpressinc.com
1099- savack.com
1100- saxhomes.com
1101- scholarsinprint.com
1102- scottframeandart.com
1103- sdfocusgroups.com
1104- seacadet.in
1105- secondchancenj.com
1106- secure-edf.com
1107- seguiresa.com
1108- seizedbymanhattanda.org
1109- selfinafilah.com
1110- selfrealisationcoach.com
1111- sellamerican.com
1112- seller.shoppe.net
1113- sellerawards.com
1114- servicrane.cl
1115- sesmun.com
1116- session2019.com
1117- setamholdings.com
1118- severantos.com
1119- sexualdesirez.com
1120- sgtpizza.org
1121- shanspot.com
1122- sherwoodsguns.com
1123- shiningdiamondsds.com
1124- shivalayjewellers.com
1125- shonpeil.com
1126- shoppe.net
1127- shopperhaven.co
1128- shorefirerecordingstudios.com
1129- silkytalk.com
1130- simonmercs.com
1131- simplylavishhair.com
1132- singularity3.co.uk
1133- sinovic-specialities.com
1134- sixlaw.com
1135- skillpromoters.co
1136- skinterestdayspa.com
1137- skydistributors.net
1138- skyevents.in
1139- sloandds.com
1140- smarthomesottawainc.ca
1141- smatforms.com
1142- smithstock.com
1143- snapkik.net
1144- socialwavephotobooths.com
1145- softwareengineerscommunity.com
1146- soldbydebbie.com
1147- solidenergysystems.com
1148- soonertimesharerelief.com
1149- soumyaiyer.com
1150- southpostllc.com
1151- sparklenc.com
1152- speednames.asia
1153- splashofsun.com
1154- spotstowels.com
1155- srigsolutions.com
1156- sritechnologyservices.com
1157- srvcfee.com
1158- ssgc.com
1159- ssnhyd.com
1160- sstechnoguideking.com
1161- stainlesssteelkitchen.com
1162- stanfordlorrypark.com
1163- starconstructionus.com
1164- starvaletparking.in
1165- statesservices.org
1166- statuselitecds.com
1167- stellarcellular.ca
1168- steltec.com
1169- stephanielevonne.com
1170- stjosephmaysville.org
1171- stlukespediatrics.com
1172- stpatrickselkhorn.org
1173- strategicactivism.com
1174- strumpet4u.com
1175- studio66.tv
1176- studioefex.com
1177- studiolifefitness.com
1178- studiotech.com
1179- suitsdistrict.com
1180- suncontrol4u.com
1181- sunitaverma.in
1182- super-service.co.uk
1183- supportingcasthc.com
1184- supremeaudiovideo.com
1185- surfingdata.com
1186- survivalistvaults.com
1187- swifthairremoval.com
1188- sworksmart.com
1189- sysplanning.com
1190- tahaismail.tv
1191- taia.com.mx
1192- talismantattoos.com
1193- tatkalsoftware.com
1194- taxinfo.co
1195- taxschool.org.in
1196- teamhoustonbaseball.com
1197- techiwizard.com
1198- tedcruz.com
1199- terminusitcorp.com
1200- texaslawnservices.com
1201- tge.cl
1202- thaparmun.com
1203- the-olive-orchard.com
1204- thebarteltdancers.com
1205- thebutlerhouse.net
1206- thecurioandcandleshop.com
1207- thedeskfactory.com
1208- thediamondgallery-nc.com
1209- thedizzyprincess.com
1210- thedolson.com
1211- thedrugandalcoholdetoxclinic.com
1212- thefishbackteam.com
1213- thefitnesshub.in
1214- theinnbetween.org
1215- thelevelmarket.com
1216- theliceclinic.net
1217- thelmasmorningcafe.com
1218- themanhole.net
1219- thepaintshuttle.com
1220- theperfectrendezvous411.com
1221- therealdebbiedrury.com
1222--------------------------------------------------
1223[!] Scanning Open Port
1224[#] 80/tcp open http
1225[#] 443/tcp open https
1226--------------------------------------------------
1227[+] Collecting Information Disclosure!
1228[#] Detecting sitemap.xml file
1229[!] sitemap.xml File Found: https://www.citizensforthestcroixvalley.com//sitemap.xml
1230[#] Detecting robots.txt file
1231[!] robots.txt File Found: https://www.citizensforthestcroixvalley.com//robots.txt
1232[#] Detecting GNU Mailman
1233[-] GNU Mailman App Not Detected!?
1234--------------------------------------------------
1235[+] Crawling Url Parameter On: https://www.citizensforthestcroixvalley.com/
1236--------------------------------------------------
1237[#] Searching Html Form !
1238[-] No Html Form Found!?
1239--------------------------------------------------
1240[!] Found 5 dom parameter
1241[#] http://www.americanthinker.com/articles/2018/01/what_i_learned_in_peace_corps_in_africa_trump_is_right.html#ixzz54WgEYJV3
1242[#] https://fraudscrookscriminals.com/2019/03/15/southern-poverty-law-center-founder-ousted-rumors-suggest-internal-racial-problems/#more-695
1243[#] http://www.speroforum.com/a/VROILPQQFO29/75024-A-Catholic-perspective-on-the-immigration-debate#.Wg247EqnHIX
1244[#] https://kstp.com/news/wisconsin-woman-pleads-guilty-to-terrorism-charges/5326074/#.XMLt720qTFo.twitter
1245[#] https://www.citizensforthestcroixvalley.com//#
1246--------------------------------------------------
1247[!] 16 Internal Dynamic Parameter Discovered
1248[+] https://www.citizensforthestcroixvalley.com////fonts.googleapis.com/css?family=Fredericka+the+Great|Allura|Amatic+SC|Arizonia|Averia+Sans+Libre|Cabin+Sketch|Francois+One|Jacques+Francois+Shadow|Josefin+Slab|Kaushan+Script|Love+Ya+Like+A+Sister|Merriweather|Offside|Open+Sans|Open+Sans+Condensed|Oswald|Over+the+Rainbow|Pacifico|Romanesco|Sacramento|Seaweed+Script|Special+Elite
1249[+] https://www.citizensforthestcroixvalley.com////fonts.googleapis.com/css?family=Source+Sans+Pro:200,400|Oswald:400,300
1250[+] https://www.citizensforthestcroixvalley.com//site.css?v=
1251[+] https://www.citizensforthestcroixvalley.com////nebula.phx3.secureserver.net/99164a3121d34c119d14e90650b4bfae?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1252[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/abb5b40c205fc730f4ca9bb88bb1c995?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1253[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/f132c8f7dc6bfc5a1d9d79f5ebb9032a?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1254[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/0d3e57b8d7d2df487e404e16e9b8cbbd?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1255[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/c743c95186b451955e6daec76b186792?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1256[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/03cacd01ae6fc231171e51c1561bc955?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1257[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/d5dee80a4665b0d0ae120d93ceda5669?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1258[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/2010aef706f57ea17065dc3e8af1057e?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1259[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/54b7e55336b0e93b74b4fa0be55f13f3?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1260[+] https://www.citizensforthestcroixvalley.com///missing_page.html?page=1b1610c9-15ca-40f8-9fa0-86f4ea5814b6
1261[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/f68411fffd6ee14e7c07135554848603?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1262[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/788785ce15f62b7b929da5481416c6cd?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1263[+] https://www.citizensforthestcroixvalley.com////nebula.wsimg.com/99ced8d9e7fcbedc6ac4543057a1190b?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1264--------------------------------------------------
1265[!] 21 External Dynamic Parameter Discovered
1266[#] https://mailchi.mp/thomasmore/tmlc-agrees-to-help-father-in-fight-with-school-over-islamic-indoctrination-of-13-year-old-daughter?e=5a82d69375
1267[#] https://www.youtube.com/watch?v=Tu6KNPMDxBIindividualson display***
1268[#] https://www.facebook.com/watch/?v=1250899275086881
1269[#] https://www.youtube.com/watch?v=nTQ5MXlztRc
1270[#] https://www.standard.net/opinion/guest-commentary/commentary-the-charity-world-s-accountability-problem/article_fc6554f1-ab18-5b9b-bf6e-10ed56a11d16.html?utm_medium=social&utm_source=twitter&utm_campaign=user-share
1271[#] http://stcroixcountywi.iqm2.com/Citizens/SplitView.aspx?Mode=Video&MeetingID=2642&Format=Agenda
1272[#] http://stcloudmn.granicus.com/MediaPlayer.php?view_id=2&clip_id=1324
1273[#] https://www.youtube.com/watch?v=8nU0mc1DXwY
1274[#] https://mailchi.mp/thomasmore/thomas-more-law-center-files-opening-brief-on-behalf-of-tennessee-challenging-the-federal-refugee-resettlement-program?e=5a82d69375
1275[#] https://pjmedia.com/trending/google-may-face-rico-defamation-lawsuits-due-to-splc-partnership-lawyers-say/?utm_source=PJMFacebook&utm_medium=post&fbclid=IwAR3Yo1lW2M81zf96BtxnbYM1aAWSCOSZGesLhShn2l_AoqBqUlWZjNc0Wbc
1276[#] http://dailyheadlines.com/another-newspaper-announces-censorship/?fbclid=IwAR0n0m97LJgO-pg-wFuQFw6m2wdPN3ZEs-pF3HJ2629WA0AnZxknER_6m5w
1277[#] http://mailchi.mp/thomasmore/courage-president-trump-kept-his-word-to-recognize-jerusalem-as-the-capital-of-israel-3-past-presidents-failed-to-keep-theirs?e=5a82d69375
1278[#] http://www.presspubs.com/opinion/columnists/article_b793059c-4795-5a55-abb3-03e9cbaa53af.html?utm_medium=social&utm_source=email&utm_campaign=user-share
1279[#] https://w3.cdn.anvato.net/player/prod/v3/anvload.html?key=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%3D
1280[#] https://vladtepesblog.com/2018/05/18/muslim-brotherhood-in-the-usa-part-ii/?utm_source=General+list&utm_campaign=489aabee42-EMAIL_CAMPAIGN_2018_05_21&utm_medium=email&utm_term=0_6c5b015c10-489aabee42-82917557
1281[#] https://www.bitchute.com/video/FCthViAU9YYW/?utm_source=General+list&utm_campaign=b9bfa92c71-EMAIL_CAMPAIGN_2018_05_07&utm_medium=email&utm_term=0_6c5b015c10-b9bfa92c71-82917557
1282[#] https://rightwisconsin.com/2018/03/26/brown-county-board-candidate-tried-to-erase-public-input/?utm_source=RightWisconsin.com&utm_campaign=7670a9e65c-EMAIL_CAMPAIGN_2018_03_26&utm_medium=email&utm_term=0_1bf75bac97-7670a9e65c-19390853&mc_cid=7670a9e65c&mc_eid=52919ef352
1283[#] https://www.youtube.com/watch?v=GgqQJnCBnSI
1284[#] https://www.centerforsecuritypolicy.org/2018/12/13/the-islamization-of-minnesota-media/?fbclid=IwAR2CQsYH1MOX3BGapVxeZwySFPOgLv1RD1d3h1EYG-zUZnGjbW-5TOPBTIY
1285[#] http://www.postbulletin.com/news/politics/candidate-under-fire-for-calling-islam-antithesis-of-constitution/article_055d6618-0f3e-594d-a1cc-07eda9705e4c.html?utm_medium=social&utm_source=facebook&utm_campaign=user-share
1286[#] https://www.godaddy.com/websites/website-builder?cvosrc=assets.wsb_badge.wsb_badge
1287--------------------------------------------------
1288[!] 21 Internal links Discovered
1289[+] https://www.citizensforthestcroixvalley.com////maxcdn.bootstrapcdn.com/font-awesome/4.2.0/css/font-awesome.min.css
1290[+] https://www.citizensforthestcroixvalley.com//southern-poverty-law-center--splc--and-the-death-of-free-speech-in-america.html
1291[+] https://www.citizensforthestcroixvalley.com//archives---inclusion--resolution--establishment-clause--etc.-.html
1292[+] https://www.citizensforthestcroixvalley.com//st.-croix-county-board.html
1293[+] https://www.citizensforthestcroixvalley.com//home.html
1294[+] https://www.citizensforthestcroixvalley.com//newsletter.html
1295[+] https://www.citizensforthestcroixvalley.com//st.-croix-county-board.html
1296[+] https://www.citizensforthestcroixvalley.com//st.-croix-county-mass-transit.html
1297[+] https://www.citizensforthestcroixvalley.com//refugee-resettlement-illegal-criminals.html
1298[+] https://www.citizensforthestcroixvalley.com//we-are-anti-islam--we-are-anti-sharia-.html
1299[+] https://www.citizensforthestcroixvalley.com//about-contact-us.html
1300[+] https://www.citizensforthestcroixvalley.com//human-sex-trafficking-in-the-st.-croix-valley.html
1301[+] https://www.citizensforthestcroixvalley.com//happening-in-minnesota--headed-our-way.html
1302[+] https://www.citizensforthestcroixvalley.com//what-can-you-do-.html
1303[+] https://www.citizensforthestcroixvalley.com//what-can-you-do---contact-area-pastors.html
1304[+] https://www.citizensforthestcroixvalley.com//media-inquiries.html
1305[+] https://www.citizensforthestcroixvalley.com//truth-with-love-map.html
1306[+] https://www.citizensforthestcroixvalley.com//same-sex-attraction-resources.html
1307[+] https://www.citizensforthestcroixvalley.com//resources.html
1308[+] https://www.citizensforthestcroixvalley.com//southern-poverty-law-center--splc--and-the-death-of-free-speech-in-america.html
1309[+] https://www.citizensforthestcroixvalley.com//happening-in-minnesota--headed-our-way.html
1310--------------------------------------------------
1311[!] 83 External links Discovered
1312[#] https://www.nbc26.com/news/local-news/marinette-county-passes-resolution-opposing-recreational-marijuana
1313[#] https://refugeeresettlementwatch.wordpress.com/2017/12/11/gao-says-climate-of-fear-in-chicken-plants-where-refugee-workers-are-part-of-the-workforce/
1314[#] http://host.madison.com/ct/news/local/govt-and-politics/wisconsin-republican-bill-would-eliminate-protected-classes-under-equal-opportunity/article_621314cb-f451-5080-b3cf-2a5c65515d31.html
1315[#] http://www.crowrivermedia.com/hutchinsonleader/news/local/welcoming-resolution-not-welcomed-in-hutchinson-here-s-what-people/article_5747a6ad-0d7b-54df-b182-fd9278c0f8ce.html
1316[#] http://hudsonstarobserver.com/opinion/letters/4500966-letters-editor-more-unites-us-divides-us
1317[#] https://refugeeresettlementwatch.wordpress.com/2018/01/14/is-minnesotas-welcome-mat-still-out-for-refugees/
1318[#] https://anchor.fm/thirdrailtalk/episodes/Episode-4-Outraged--Minnesota-Activist-Michele-Evan-About-The-MN-DHS-Daycare-Fraud-Scandal-e2pu9o
1319[#] https://refugeeresettlementwatch.wordpress.com/2018/01/11/us-news-and-world-report-takes-notice-of-south-dakota-refugee-controversy/
1320[#] https://www.youtube.com/channel/UCZ3jQHfp2PczM4aQK4qEbfg
1321[#] https://refugeeresettlementwatch.wordpress.com/2017/11/21/st-cloud-cair-ham-handed-program-backfires/
1322[#] https://www.cotton.senate.gov/files/documents/2019%20SPLC%20Cotton%20Letter%20VF.pdf
1323[#] https://2001-2009.state.gov/r/pa/ho/time/cwr/87719.htm
1324[#] http://www.breitbart.com/big-government/2017/11/11/source-claims-financial-mismanagement-fraud-harassment-lutheran-immigration-refugee-service-spark-external-investigation/
1325[#] https://dailycaller.com/2019/03/22/splc-richard-cohen-resigns/
1326[#] https://www.lifesitenews.com/opinion/can-the-church-recover-its-fighting-spirit-regarding-islam
1327[#] https://www.jihadwatch.org/2018/01/minnesota-muslima-sets-fires-at-st-catherine-university-says-you-guys-are-lucky-i-dont-know-how-to-build-a-bomb
1328[#] https://www.rivertowns.net/news/government-and-politics/4663489-Communities-unite-to-oppose-western-Wisconsin-railroad-project
1329[#] http://www.foxnews.com/world/2017/11/21/ap-probe-sexual-abuse-pervasive-in-pakistan-islamic-schools.html
1330[#] https://www.law.cornell.edu/uscode/text/8/1522
1331[#] http://alphanewsmn.com/no-sale-throwing-money-minnesotas-somali-problem/
1332[#] https://clarionproject.org/poll-results-islam-course-public-school/
1333[#] https://yougov.co.uk/news/2018/05/11/yougov-data-reveals-what-europeans-think-are-most-/
1334[#] https://pjmedia.com/trending/splcs-hate-group-accusation-outed-as-a-scam-more-than-60-groups-considering-lawsuits/
1335[#] https://www.riverfallsjournal.com/business/transportation/4599807-public-program-april-24-proposed-passenger-train
1336[#] https://www.theahafoundation.org/ayaan-hirsi-ali-founder-of-the-aha-foundation/
1337[#] https://www.cnsnews.com/news/article/craig-bannister/bozell-signs-letters-demanding-media-social-ceos-abandon-hate-filled
1338[#] https://www.twincities.com/2017/12/21/jeff-johnson-its-time-to-pause-refugee-resettlement-in-minnesota/
1339[#] https://minnesota.cbslocal.com/2015/09/10/serious-crimes-happening-on-light-rail-trains-platforms/
1340[#] https://www.breitbart.com/the-media/2019/03/28/dan-stein-the-southern-poverty-law-center-scandal-brings-shame-on-the-media/
1341[#] http://www.breitbart.com/london/2018/03/18/thousands-gather-londons-speakers-corner-hear-tommy-robinson-deliver-banned-right-wing-activists-speech/
1342[#] https://www.jihadwatch.org/2018/01/germany-muslim-migrant-in-court-for-murdering-woman-who-converted-to-from-islam-to-christianity
1343[#] http://alphanewsmn.com/mosque-neighbors-petition-council/
1344[#] http://www.CitizensFortheStCroixValley.com
1345[#] https://refugeeresettlementwatch.wordpress.com/2016/12/23/new-mexico-lutheran-resettlement-contractor-puts-brakes-on-new-sante-fe-refugee-program/
1346[#] https://www.prnewswire.com/news-releases/fair-new-report-reveals-how-the-southern-poverty-law-center-scams-the-media-300824187.html
1347[#] https://www.hannity.com/media-room/game-changer-dhs-to-begin-charging-mayors-of-sanctuary-cities/
1348[#] https://docs.wixstatic.com/ugd/571155_5774a62a2c0e467b93aac4a283cabd69.pdf
1349[#] http://www.wnd.com/2017/10/city-uses-dirty-play-to-squelch-citizen-revolt-over-refugees/
1350[#] https://refugeeresettlementwatch.wordpress.com/2018/01/28/somali-who-stabbed-two-in-mall-of-america-in-november-says-it-was-an-act-of-jihad/
1351[#] http://www.americanthinker.com/articles/2018/01/what_i_learned_in_peace_corps_in_africa_trump_is_right.html#ixzz54WgEYJV3
1352[#] https://www.understandingthethreat.com/in-this-war-minnesotas-twin-cities-are-lost/
1353[#] https://wkow.com/news/2019/02/26/group-urges-wisconsin-lawmakers-to-consider-red-flag-law/
1354[#] https://pjmedia.com/trending/lawsuit-claims-splc-abetted-theft-spread-lies-to-destroy-lawyer-for-thought-crime/
1355[#] https://www.jihadwatch.org/2018/06/47-groups-weighing-splc-lawsuit-warn-editors-you-are-complicit-in-hate-group-defamation
1356[#] https://pjmedia.com/trending/judeo-christian-group-sues-michigan-for-orwellian-witch-hunt-based-on-splc-labels/
1357[#] https://www.mrctv.org/videos/brigitte-gabriel-refugee-resettlement-about-supplying-cheap-labor-us-taxpayer-expense
1358[#] https://fraudscrookscriminals.com/2019/03/15/southern-poverty-law-center-founder-ousted-rumors-suggest-internal-racial-problems/#more-695
1359[#] https://leohohmann.com/2018/03/29/10-reasons-global-elites-wont-let-trump-end-islamic-immigration-and-ban-muslim-brotherhood/
1360[#] https://www.oregonlive.com/opinion/2019/04/opinion-southern-poverty-law-center-should-be-investigated.html
1361[#] http://www.americanthinker.com/articles/2017/10/muslim_brotherhood_political_infiltration_on_steroids.html
1362[#] https://www.investigativeproject.org/documents/misc/20.pdf
1363[#] http://www.hudsonstarobserver.com/opinion/letters/4420938-viewpoint-whats-missing-critical-thinking
1364[#] http://www.wnd.com/2016/07/u-s-city-rolls-over-for-radical-mosque/
1365[#] https://www.thomasmore.org/news/new-jersey-middle-school-instructs-students-islam-true-faith-thomas-law-center-files-federal-lawsuit-must-see-video/
1366[#] http://www.speroforum.com/a/VROILPQQFO29/75024-A-Catholic-perspective-on-the-immigration-debate#.Wg247EqnHIX
1367[#] https://refugeeresettlementwatch.wordpress.com/2017/11/26/minnesotan-does-some-homework-on-refugee-employment-issue-comes-to-unexpected-conclusion/
1368[#] http://www.maciverinstitute.com/2018/03/assembly-democrats-unveil-roadmap-to-permanently-change-constitution/
1369[#] https://www.gatestoneinstitute.org/12389/britain-dissent-silenced
1370[#] http://www.maciverinstitute.com/2018/09/a-constitution-if-you-can-keep-it/
1371[#] https://www.jihadwatch.org/2018/01/iranian-woman-who-took-off-her-hijab-and-became-symbol-of-freedom-is-missing-and-feared-arrested
1372[#] https://www.jihadwatch.org/2018/02/fbi-questioned-muslima-four-months-before-her-jihad-arson-attack-for-exhorting-muslims-to-join-jihad-terror-groups
1373[#] https://www.washingtontimes.com/news/2017/aug/23/southern-poverty-law-center-hit-with-defamation-la/
1374[#] https://www.americanthinker.com/articles/2019/04/michigan_ags_stasilike_speechmonitoring_scheme_earns_a_federal_lawsuit.html
1375[#] https://refugeeresettlementwatch.wordpress.com/2018/01/09/new-american-economy-admits-they-need-refugee-migrant-laborers-for-meatpackers/
1376[#] https://www.thomasmore.org/press-releases/new-jersey-islamic-indoctrination-case-will-proceed-as-judge-denies-chathams-school-district-motion-to-dismiss/
1377[#] http://www.fox9.com/news/minnesota-lawmakers-press-for-answers-on-daycare-fraud-investigation
1378[#] https://insider.foxnews.com/2019/04/03/sen-tom-cotton-wants-irs-investigate-southern-poverty-law-center-tax-exempt-status
1379[#] https://twitter.com/CitizensValley
1380[#] https://www.hudsonstarobserver.com/news/traffic-and-construction/4606356-plans-track-bringing-passenger-train-through-area
1381[#] https://ecode360.com/9771873
1382[#] http://www.startribune.com/st-cloud-council-member-pushes-for-moratorium-on-refugee-resettlement/455648873/
1383[#] https://www.gatestoneinstitute.org/11448/jihadists-students-america
1384[#] https://www.lifesitenews.com/news/rosary-on-the-borders-coming-to-america-on-december-12
1385[#] https://gellerreport.com/2018/02/120db.html/
1386[#] https://www.newyorker.com/news/news-desk/the-reckoning-of-morris-dees-and-the-southern-poverty-law-center
1387[#] http://lacrossetribune.com/news/local/levies-assessments-and-equalized-value-unraveling-the-property-tax-knot/article_22da4baf-4055-5398-818a-d2786c7fc396.html
1388[#] https://www.jihadwatch.org/2017/12/new-york-subway-jihad-bomber-came-to-us-via-chain-migration
1389[#] https://refugeeresettlementwatch.wordpress.com/2017/10/25/no-such-thing-as-minnesota-nice-as-st-cloud-mayor-and-council-play-dirty/
1390[#] http://knsiradio.com/podcasts/ox-afternoon/dr-john-palmer-concerned-community-citizens-discusses-st-cloud-issues-segment-2
1391[#] https://kstp.com/news/wisconsin-woman-pleads-guilty-to-terrorism-charges/5326074/#.XMLt720qTFo.twitter
1392[#] http://centerfortuberculosis.mayo.edu/uploads/7/1/7/3/71735537/2016_wi_epidemiology_update_-_vang.pdf
1393[#] https://whiteroseresistere.blogspot.com/
1394[#] https://www.twincities.com/2018/02/07/former-st-kates-student-accused-of-setting-fires-on-campus-now-facing-federal-terrorism-charges/
1395--------------------------------------------------
1396[#] Mapping Subdomain..
1397[!] Found 1 Subdomain
1398- citizensforthestcroixvalley.com
1399--------------------------------------------------
1400[!] Done At 2019-10-24 18:06:37.506804
1401#####################################################################################################################################
1402[i] Scanning Site: https://www.citizensforthestcroixvalley.com
1403
1404
1405
1406B A S I C I N F O
1407====================
1408
1409
1410[+] Site Title: Citizens for the St. Croix Valley
1411[+] IP address: 160.153.136.3
1412[+] Web Server: DPS/1.6.13
1413[+] CMS: Could Not Detect
1414[+] Cloudflare: Not Detected
1415[+] Robots File: Found
1416
1417-------------[ contents ]----------------
1418
1419
1420
1421User-agent: *
1422Disallow: /cache/
1423Disallow: /_backup/
1424Disallow: /_mygallery/
1425Disallow: /_temp/
1426Disallow: /_tempalbums/
1427Disallow: /_tmpfileop/
1428Disallow: /dbboon/
1429Disallow: /Flash/
1430Disallow: /images/
1431Disallow: /mobile/
1432Disallow: /plugins/
1433Disallow: /scripts/
1434Disallow: /stats/
1435Disallow: /statshistory/
1436Disallow: /QSC/
1437-----------[end of contents]-------------
1438
1439
1440
1441W H O I S L O O K U P
1442========================
1443
1444 Domain Name: CITIZENSFORTHESTCROIXVALLEY.COM
1445 Registry Domain ID: 2089903015_DOMAIN_COM-VRSN
1446 Registrar WHOIS Server: whois.godaddy.com
1447 Registrar URL: http://www.godaddy.com
1448 Updated Date: 2018-12-14T12:48:41Z
1449 Creation Date: 2017-01-13T22:16:05Z
1450 Registry Expiry Date: 2020-01-13T22:16:05Z
1451 Registrar: GoDaddy.com, LLC
1452 Registrar IANA ID: 146
1453 Registrar Abuse Contact Email: abuse@godaddy.com
1454 Registrar Abuse Contact Phone: 480-624-2505
1455 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
1456 Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
1457 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
1458 Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
1459 Name Server: NS49.DOMAINCONTROL.COM
1460 Name Server: NS50.DOMAINCONTROL.COM
1461 DNSSEC: unsigned
1462 URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
1463>>> Last update of whois database: 2019-10-24T22:04:54Z <<<
1464
1465For more information on Whois status codes, please visit https://icann.org/epp
1466
1467
1468
1469The Registry database contains ONLY .COM, .NET, .EDU domains and
1470Registrars.
1471
1472
1473
1474
1475G E O I P L O O K U P
1476=========================
1477
1478[i] IP Address: 72.167.191.69
1479[i] Country: United States
1480[i] State: Arizona
1481[i] City: Scottsdale
1482[i] Latitude: 33.6013
1483[i] Longitude: -111.8867
1484
1485
1486
1487
1488H T T P H E A D E R S
1489=======================
1490
1491
1492[i] HTTP/1.1 200 OK
1493[i] Link: <https://www.citizensforthestcroixvalley.com/site.css?v=>; rel=preload; as=style,<https://fonts.googleapis.com>; rel=preconnect; crossorigin,<https://fonts.gstatic.com>; rel=preconnect; crossorigin,<https://img1.wsimg.com>; rel=preconnect; crossorigin,<https://img2.wsimg.com>; rel=preconnect; crossorigin,<https://img4.wsimg.com>; rel=preconnect; crossorigin,<https://nebula.wsimg.com>; rel=preconnect; crossorigin
1494[i] Cache-Control: public, max-age=60, s-maxage=300
1495[i] Content-Security-Policy: frame-ancestors 'self'
1496[i] Content-Type: text/html; charset=utf-8
1497[i] Vary: Accept-Encoding
1498[i] Content-Encoding: raw
1499[i] Server: DPS/1.6.13
1500[i] X-SiteId: 4000
1501[i] Set-Cookie: dps_site_id=4000; path=/; secure
1502[i] ETag: cf9d0bc403007a25332707e4faff7c69
1503[i] Date: Thu, 24 Oct 2019 22:05:13 GMT
1504[i] Connection: close
1505
1506
1507
1508
1509D N S L O O K U P
1510===================
1511
1512citizensforthestcroixvalley.com. 599 IN A 198.71.232.3
1513citizensforthestcroixvalley.com. 3599 IN NS ns49.domaincontrol.com.
1514citizensforthestcroixvalley.com. 3599 IN NS ns50.domaincontrol.com.
1515citizensforthestcroixvalley.com. 599 IN SOA ns49.domaincontrol.com. dns.jomax.net. 2019101008 28800 7200 604800 600
1516citizensforthestcroixvalley.com. 599 IN MX 0 citizensforthestcroixvalley-com.mail.protection.outlook.com.
1517citizensforthestcroixvalley.com. 599 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
1518citizensforthestcroixvalley.com. 599 IN TXT "NETORGFT2728187.onmicrosoft.com"
1519
1520
1521
1522
1523S U B N E T C A L C U L A T I O N
1524====================================
1525
1526Address = 72.167.191.69
1527Network = 72.167.191.69 / 32
1528Netmask = 255.255.255.255
1529Broadcast = not needed on Point-to-Point links
1530Wildcard Mask = 0.0.0.0
1531Hosts Bits = 0
1532Max. Hosts = 1 (2^0 - 0)
1533Host Range = { 72.167.191.69 - 72.167.191.69 }
1534
1535
1536
1537N M A P P O R T S C A N
1538============================
1539
1540Starting Nmap 7.70 ( https://nmap.org ) at 2019-10-24 22:05 UTC
1541Nmap scan report for citizensforthestcroixvalley.com (198.71.232.3)
1542Host is up (0.13s latency).
1543rDNS record for 198.71.232.3: ip-198-71-232-3.ip.secureserver.net
1544
1545PORT STATE SERVICE
154621/tcp open ftp
154722/tcp filtered ssh
154823/tcp filtered telnet
154980/tcp open http
1550110/tcp filtered pop3
1551143/tcp filtered imap
1552443/tcp open https
15533389/tcp filtered ms-wbt-server
1554
1555Nmap done: 1 IP address (1 host up) scanned in 13.63 seconds
1556######################################################################################################################################
1557[INFO] ------TARGET info------
1558[*] TARGET: https://www.citizensforthestcroixvalley.com/
1559[*] TARGET IP: 160.153.136.3
1560[INFO] NO load balancer detected for www.citizensforthestcroixvalley.com...
1561[*] DNS servers: citizensforthestcroixvalley.com.
1562[*] TARGET server: DPS/1.6.13
1563[*] CC: NL
1564[*] Country: Netherlands
1565[*] RegionCode: NH
1566[*] RegionName: North Holland
1567[*] City: Amsterdam
1568[*] ASN: AS26496
1569[*] BGP_PREFIX: 160.153.128.0/17
1570[*] ISP: AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US
1571[INFO] SSL/HTTPS certificate detected
1572[*] Issuer: issuer=C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", OU = http://certs.godaddy.com/repository/, CN = Go Daddy Secure Certificate Authority - G2
1573[*] Subject: subject=OU = Domain Control Validated, CN = citizensforthestcroixvalley.com
1574[INFO] DNS enumeration:
1575[*] ftp.citizensforthestcroixvalley.com citizensforthestcroixvalley.com. 160.153.136.3
1576[INFO] Possible abuse mails are:
1577[*] abuse@citizensforthestcroixvalley.com
1578[*] abuse@www.citizensforthestcroixvalley.com
1579[*] fbl-spamcop@ext.godaddy.com
1580[INFO] NO PAC (Proxy Auto Configuration) file FOUND
1581[ALERT] robots.txt file FOUND in http://www.citizensforthestcroixvalley.com/robots.txt
1582[INFO] Checking for HTTP status codes recursively from http://www.citizensforthestcroixvalley.com/robots.txt
1583[INFO] Status code Folders
1584[INFO] Starting FUZZing in http://www.citizensforthestcroixvalley.com/FUzZzZzZzZz...
1585[INFO] Status code Folders
1586[ALERT] Look in the source code. It may contain passwords
1587[INFO] Links found from https://www.citizensforthestcroixvalley.com/ http://160.153.136.3/:
1588[*] http://alphanewsmn.com/mosque-neighbors-petition-council/
1589[*] http://alphanewsmn.com/no-sale-throwing-money-minnesotas-somali-problem/
1590[*] http://centerfortuberculosis.mayo.edu/uploads/7/1/7/3/71735537/2016_wi_epidemiology_update_-_vang.pdf
1591[*] http://dailyheadlines.com/another-newspaper-announces-censorship/?fbclid=IwAR0n0m97LJgO-pg-wFuQFw6m2wdPN3ZEs-pF3HJ2629WA0AnZxknER_6m5w
1592[*] http://host.madison.com/ct/news/local/govt-and-politics/wisconsin-republican-bill-would-eliminate-protected-classes-under-equal-opportunity/article_621314cb-f451-5080-b3cf-2a5c65515d31.html
1593[*] http://hudsonstarobserver.com/opinion/letters/4500966-letters-editor-more-unites-us-divides-us
1594[*] http://knsiradio.com/podcasts/ox-afternoon/dr-john-palmer-concerned-community-citizens-discusses-st-cloud-issues-segment-2
1595[*] http://lacrossetribune.com/news/local/levies-assessments-and-equalized-value-unraveling-the-property-tax-knot/article_22da4baf-4055-5398-818a-d2786c7fc396.html
1596[*] http://mailchi.mp/thomasmore/courage-president-trump-kept-his-word-to-recognize-jerusalem-as-the-capital-of-israel-3-past-presidents-failed-to-keep-theirs?e=5a82d69375
1597[*] https://2001-2009.state.gov/r/pa/ho/time/cwr/87719.htm
1598[*] https://anchor.fm/thirdrailtalk/episodes/Episode-4-Outraged--Minnesota-Activist-Michele-Evan-About-The-MN-DHS-Daycare-Fraud-Scandal-e2pu9o
1599[*] https://clarionproject.org/poll-results-islam-course-public-school/
1600[*] https://dailycaller.com/2019/03/22/splc-richard-cohen-resigns/
1601[*] https://docs.wixstatic.com/ugd/571155_5774a62a2c0e467b93aac4a283cabd69.pdf
1602[*] https://ecode360.com/9771873
1603[*] https://fraudscrookscriminals.com/2019/03/15/southern-poverty-law-center-founder-ousted-rumors-suggest-internal-racial-problems/#more-695
1604[*] https://gellerreport.com/2018/02/120db.html/
1605[*] https://insider.foxnews.com/2019/04/03/sen-tom-cotton-wants-irs-investigate-southern-poverty-law-center-tax-exempt-status
1606[*] https://kstp.com/news/wisconsin-woman-pleads-guilty-to-terrorism-charges/5326074/#.XMLt720qTFo.twitter
1607[*] https://leohohmann.com/2018/03/29/10-reasons-global-elites-wont-let-trump-end-islamic-immigration-and-ban-muslim-brotherhood/
1608[*] https://mailchi.mp/thomasmore/thomas-more-law-center-files-opening-brief-on-behalf-of-tennessee-challenging-the-federal-refugee-resettlement-program?e=5a82d69375
1609[*] https://mailchi.mp/thomasmore/tmlc-agrees-to-help-father-in-fight-with-school-over-islamic-indoctrination-of-13-year-old-daughter?e=5a82d69375
1610[*] https://minnesota.cbslocal.com/2015/09/10/serious-crimes-happening-on-light-rail-trains-platforms/
1611[*] https://nebula.wsimg.com/03cacd01ae6fc231171e51c1561bc955?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1612[*] https://nebula.wsimg.com/0d3e57b8d7d2df487e404e16e9b8cbbd?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1613[*] https://nebula.wsimg.com/2010aef706f57ea17065dc3e8af1057e?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1614[*] https://nebula.wsimg.com/54b7e55336b0e93b74b4fa0be55f13f3?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1615[*] https://nebula.wsimg.com/788785ce15f62b7b929da5481416c6cd?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1616[*] https://nebula.wsimg.com/99ced8d9e7fcbedc6ac4543057a1190b?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1617[*] https://nebula.wsimg.com/abb5b40c205fc730f4ca9bb88bb1c995?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1618[*] https://nebula.wsimg.com/c743c95186b451955e6daec76b186792?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1619[*] https://nebula.wsimg.com/d5dee80a4665b0d0ae120d93ceda5669?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1620[*] https://nebula.wsimg.com/f132c8f7dc6bfc5a1d9d79f5ebb9032a?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1621[*] https://nebula.wsimg.com/f68411fffd6ee14e7c07135554848603?AccessKeyId=80020C0EAA93311E18E2&disposition=0&alloworigin=1
1622[*] https://pjmedia.com/trending/google-may-face-rico-defamation-lawsuits-due-to-splc-partnership-lawyers-say/?utm_source=PJMFacebook&utm_medium=post&fbclid=IwAR3Yo1lW2M81zf96BtxnbYM1aAWSCOSZGesLhShn2l_AoqBqUlWZjNc0Wbc
1623[*] https://pjmedia.com/trending/judeo-christian-group-sues-michigan-for-orwellian-witch-hunt-based-on-splc-labels/
1624[*] https://pjmedia.com/trending/lawsuit-claims-splc-abetted-theft-spread-lies-to-destroy-lawyer-for-thought-crime/
1625[*] https://pjmedia.com/trending/splcs-hate-group-accusation-outed-as-a-scam-more-than-60-groups-considering-lawsuits/
1626[*] https://refugeeresettlementwatch.wordpress.com/2016/12/23/new-mexico-lutheran-resettlement-contractor-puts-brakes-on-new-sante-fe-refugee-program/
1627[*] https://refugeeresettlementwatch.wordpress.com/2017/10/25/no-such-thing-as-minnesota-nice-as-st-cloud-mayor-and-council-play-dirty/
1628[*] https://refugeeresettlementwatch.wordpress.com/2017/11/21/st-cloud-cair-ham-handed-program-backfires/
1629[*] https://refugeeresettlementwatch.wordpress.com/2017/11/26/minnesotan-does-some-homework-on-refugee-employment-issue-comes-to-unexpected-conclusion/
1630[*] https://refugeeresettlementwatch.wordpress.com/2017/12/11/gao-says-climate-of-fear-in-chicken-plants-where-refugee-workers-are-part-of-the-workforce/
1631[*] https://refugeeresettlementwatch.wordpress.com/2018/01/09/new-american-economy-admits-they-need-refugee-migrant-laborers-for-meatpackers/
1632[*] https://refugeeresettlementwatch.wordpress.com/2018/01/11/us-news-and-world-report-takes-notice-of-south-dakota-refugee-controversy/
1633[*] https://refugeeresettlementwatch.wordpress.com/2018/01/14/is-minnesotas-welcome-mat-still-out-for-refugees/
1634[*] https://refugeeresettlementwatch.wordpress.com/2018/01/28/somali-who-stabbed-two-in-mall-of-america-in-november-says-it-was-an-act-of-jihad/
1635[*] https://rightwisconsin.com/2018/03/26/brown-county-board-candidate-tried-to-erase-public-input/?utm_source=RightWisconsin.com&utm_campaign=7670a9e65c-EMAIL_CAMPAIGN_2018_03_26&utm_medium=email&utm_term=0_1bf75bac97-7670a9e65c-19390853&mc_cid=7670a9e65c&mc_eid=52919ef352
1636[*] http://stcloudmn.granicus.com/MediaPlayer.php?view_id=2&clip_id=1324
1637[*] http://stcroixcountywi.iqm2.com/Citizens/SplitView.aspx?Mode=Video&MeetingID=2642&Format=Agenda
1638[*] https://twitter.com/CitizensValley
1639[*] https://vladtepesblog.com/2018/05/18/muslim-brotherhood-in-the-usa-part-ii/?utm_source=General+list&utm_campaign=489aabee42-EMAIL_CAMPAIGN_2018_05_21&utm_medium=email&utm_term=0_6c5b015c10-489aabee42-82917557
1640[*] https://w3.cdn.anvato.net/player/prod/v3/anvload.html?key=eyJtIjoiZXBmb3giLCJwIjoiZGVmYXVsdCIsInYiOiI0Mjk3OTQiLCJhbnZhY2siOiJhbnZhdG9fZXBmb3hfYXBwX3dlYl9wcm9kX2IzMzczMTY4ZTEyZjQyM2Y0MTUwNGYyMDcwMDAxODhkYWY4ODI1MWIiLCJwbHVnaW5zIjp7ImRmcCI6eyJjbGllbnRTaWRlIjp7ImFkVGFnVXJsIjoiaHR0cHM6Ly9wdWJhZHMuZy5kb3VibGVjbGljay5uZXQvZ2FtcGFkL2Fkcz9zej02NDB4NDgwJml1PS82Mzc5MDU2NC9rbXNwL25ld3MmY2l1X3N6cz0zMDB4MjUwJmltcGw9cyZnZGZwX3JlcT0xJmVudj12cCZvdXRwdXQ9dmFzdCZ2cG9zPXByZXJvbGwmdW52aWV3ZWRfcG9zaXRpb25fc3RhcnQ9MSZ1cmw9W3JlZmVycmVyX3VybF0mY29ycmVsYXRvcj1bdGltZXN0YW1wXSZkZXNjcmlwdGlvbl91cmw9aHR0cCUzQSUyRiUyRnd3dy5mb3g5LmNvbSUyRm5ld3MlMkZmb3JtZXItc3R1ZGVudC1jaGFyZ2VkLXdpdGgtc2V0dGluZy1tdWx0aXBsZS1maXJlcy1hdC1zdC1rYXRlcyUzRl9fdHdpdHRlcl9pbXByZXNzaW9uJTNEdHJ1ZSJ9fSwicmVhbFRpbWVBbmFseXRpY3MiOnRydWV9LCJodG1sNSI6dHJ1ZX0=
1641[*] https://whiteroseresistere.blogspot.com/
1642[*] https://wkow.com/news/2019/02/26/group-urges-wisconsin-lawmakers-to-consider-red-flag-law/
1643[*] https://www.americanthinker.com/articles/2019/04/michigan_ags_stasilike_speechmonitoring_scheme_earns_a_federal_lawsuit.html
1644[*] https://www.bitchute.com/video/FCthViAU9YYW/?utm_source=General+list&utm_campaign=b9bfa92c71-EMAIL_CAMPAIGN_2018_05_07&utm_medium=email&utm_term=0_6c5b015c10-b9bfa92c71-82917557
1645[*] https://www.breitbart.com/the-media/2019/03/28/dan-stein-the-southern-poverty-law-center-scandal-brings-shame-on-the-media/
1646[*] https://www.centerforsecuritypolicy.org/2018/12/13/the-islamization-of-minnesota-media/?fbclid=IwAR2CQsYH1MOX3BGapVxeZwySFPOgLv1RD1d3h1EYG-zUZnGjbW-5TOPBTIY
1647[*] https://www.citizensforthestcroixvalley.com/
1648[*] https://www.citizensforthestcroixvalley.com/about-contact-us.html
1649[*] https://www.citizensforthestcroixvalley.com/archives---inclusion--resolution--establishment-clause--etc.-.html
1650[*] https://www.citizensforthestcroixvalley.com/happening-in-minnesota--headed-our-way.html
1651[*] https://www.citizensforthestcroixvalley.com/home.html
1652[*] https://www.citizensforthestcroixvalley.com/human-sex-trafficking-in-the-st.-croix-valley.html
1653[*] https://www.citizensforthestcroixvalley.com/media-inquiries.html
1654[*] https://www.citizensforthestcroixvalley.com/missing_page.html?page=1b1610c9-15ca-40f8-9fa0-86f4ea5814b6
1655[*] https://www.citizensforthestcroixvalley.com/newsletter.html
1656[*] https://www.citizensforthestcroixvalley.com/refugee-resettlement-illegal-criminals.html
1657[*] https://www.citizensforthestcroixvalley.com/resources.html
1658[*] https://www.citizensforthestcroixvalley.com/same-sex-attraction-resources.html
1659[*] https://www.citizensforthestcroixvalley.com/southern-poverty-law-center--splc--and-the-death-of-free-speech-in-america.html
1660[*] https://www.citizensforthestcroixvalley.com/st.-croix-county-board.html
1661[*] https://www.citizensforthestcroixvalley.com/st.-croix-county-mass-transit.html
1662[*] https://www.citizensforthestcroixvalley.com/truth-with-love-map.html
1663[*] https://www.citizensforthestcroixvalley.com/we-are-anti-islam--we-are-anti-sharia-.html
1664[*] https://www.citizensforthestcroixvalley.com/what-can-you-do---contact-area-pastors.html
1665[*] https://www.citizensforthestcroixvalley.com/what-can-you-do-.html
1666[*] https://www.cnsnews.com/news/article/craig-bannister/bozell-signs-letters-demanding-media-social-ceos-abandon-hate-filled
1667[*] https://www.cotton.senate.gov/files/documents/2019 SPLC Cotton Letter VF.pdf
1668[*] https://www.facebook.com/watch/?v=1250899275086881
1669[*] https://www.gatestoneinstitute.org/11448/jihadists-students-america
1670[*] https://www.gatestoneinstitute.org/12389/britain-dissent-silenced
1671[*] https://www.godaddy.com/websites/website-builder?cvosrc=assets.wsb_badge.wsb_badge
1672[*] https://www.hannity.com/media-room/game-changer-dhs-to-begin-charging-mayors-of-sanctuary-cities/
1673[*] https://www.hudsonstarobserver.com/news/traffic-and-construction/4606356-plans-track-bringing-passenger-train-through-area
1674[*] https://www.investigativeproject.org/documents/misc/20.pdf
1675[*] https://www.jihadwatch.org/2017/12/new-york-subway-jihad-bomber-came-to-us-via-chain-migration
1676[*] https://www.jihadwatch.org/2018/01/germany-muslim-migrant-in-court-for-murdering-woman-who-converted-to-from-islam-to-christianity
1677[*] https://www.jihadwatch.org/2018/01/iranian-woman-who-took-off-her-hijab-and-became-symbol-of-freedom-is-missing-and-feared-arrested
1678[*] https://www.jihadwatch.org/2018/01/minnesota-muslima-sets-fires-at-st-catherine-university-says-you-guys-are-lucky-i-dont-know-how-to-build-a-bomb
1679[*] https://www.jihadwatch.org/2018/02/fbi-questioned-muslima-four-months-before-her-jihad-arson-attack-for-exhorting-muslims-to-join-jihad-terror-groups
1680[*] https://www.jihadwatch.org/2018/06/47-groups-weighing-splc-lawsuit-warn-editors-you-are-complicit-in-hate-group-defamation
1681[*] https://www.law.cornell.edu/uscode/text/8/1522
1682[*] https://www.lifesitenews.com/news/rosary-on-the-borders-coming-to-america-on-december-12
1683[*] https://www.lifesitenews.com/opinion/can-the-church-recover-its-fighting-spirit-regarding-islam
1684[*] https://www.mrctv.org/videos/brigitte-gabriel-refugee-resettlement-about-supplying-cheap-labor-us-taxpayer-expense
1685[*] https://www.nbc26.com/news/local-news/marinette-county-passes-resolution-opposing-recreational-marijuana
1686[*] https://www.newyorker.com/news/news-desk/the-reckoning-of-morris-dees-and-the-southern-poverty-law-center
1687[*] https://www.oregonlive.com/opinion/2019/04/opinion-southern-poverty-law-center-should-be-investigated.html
1688[*] https://www.prnewswire.com/news-releases/fair-new-report-reveals-how-the-southern-poverty-law-center-scams-the-media-300824187.html
1689[*] https://www.riverfallsjournal.com/business/transportation/4599807-public-program-april-24-proposed-passenger-train
1690[*] https://www.rivertowns.net/news/government-and-politics/4663489-Communities-unite-to-oppose-western-Wisconsin-railroad-project
1691[*] https://www.standard.net/opinion/guest-commentary/commentary-the-charity-world-s-accountability-problem/article_fc6554f1-ab18-5b9b-bf6e-10ed56a11d16.html?utm_medium=social&utm_source=twitter&utm_campaign=user-share
1692[*] https://www.theahafoundation.org/ayaan-hirsi-ali-founder-of-the-aha-foundation/
1693[*] https://www.thomasmore.org/news/new-jersey-middle-school-instructs-students-islam-true-faith-thomas-law-center-files-federal-lawsuit-must-see-video/
1694[*] https://www.thomasmore.org/press-releases/new-jersey-islamic-indoctrination-case-will-proceed-as-judge-denies-chathams-school-district-motion-to-dismiss/
1695[*] https://www.twincities.com/2017/12/21/jeff-johnson-its-time-to-pause-refugee-resettlement-in-minnesota/
1696[*] https://www.twincities.com/2018/02/07/former-st-kates-student-accused-of-setting-fires-on-campus-now-facing-federal-terrorism-charges/
1697[*] https://www.understandingthethreat.com/in-this-war-minnesotas-twin-cities-are-lost/
1698[*] https://www.washingtontimes.com/news/2017/aug/23/southern-poverty-law-center-hit-with-defamation-la/
1699[*] https://www.youtube.com/channel/UCZ3jQHfp2PczM4aQK4qEbfg
1700[*] https://www.youtube.com/embed/_1vj1MF2deE?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1701[*] https://www.youtube.com/embed/3DoVTbup548?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1702[*] https://www.youtube.com/embed/4uEy2jzv1kI?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1703[*] https://www.youtube.com/embed/aTjmk2F7qUo?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1704[*] https://www.youtube.com/embed/Awpa9OgzoXY?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1705[*] https://www.youtube.com/embed/BUhslyGfGTI?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1706[*] https://www.youtube.com/embed/c0B-KUwpPj8?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1707[*] https://www.youtube.com/embed/dhiB8mtQ3Pg?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1708[*] https://www.youtube.com/embed/dxUVm3P5HPY?feature=oembed&wmode=opaque&autoplay=0
1709[*] https://www.youtube.com/embed/E5AlTsicf6k?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1710[*] https://www.youtube.com/embed/EuNKs0RKHtw?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1711[*] https://www.youtube.com/embed/fBAWWERxPvI?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1712[*] https://www.youtube.com/embed/Fom_O7VnDYY?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1713[*] https://www.youtube.com/embed/guXBTgAxhIw?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1714[*] https://www.youtube.com/embed/ifmITIu7jXU?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1715[*] https://www.youtube.com/embed/KgDLyVbb4Jg?feature=oembed&wmode=opaque&autoplay=0
1716[*] https://www.youtube.com/embed/MS4WmBonQzc?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1717[*] https://www.youtube.com/embed/N3Ri3YWnjnA?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1718[*] https://www.youtube.com/embed/NN0vkSO9n8Y?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1719[*] https://www.youtube.com/embed/Nx2BgyN1uW4?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1720[*] https://www.youtube.com/embed/O5pWPyURecg?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1721[*] https://www.youtube.com/embed/oGe3pypQWl0?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1722[*] https://www.youtube.com/embed/qRs4ADgR5dM?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1723[*] https://www.youtube.com/embed/r6eqNBrMY9s?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1724[*] https://www.youtube.com/embed/Ry3NzkAOo3s?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1725[*] https://www.youtube.com/embed/RZlICdawHRA?feature=oembed&wmode=opaque&autoplay=0
1726[*] https://www.youtube.com/embed/S5CsxjI4r38?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1727[*] https://www.youtube.com/embed/SaPOHQdR8dE?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1728[*] https://www.youtube.com/embed/Tu6KNPMDxBI?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1729[*] https://www.youtube.com/embed/ur9Un8wpbtI?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1730[*] https://www.youtube.com/embed/w5oLoW9jZJc?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1731[*] https://www.youtube.com/embed/xtwAuUWrTnY?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
1732[*] https://www.youtube.com/watch?v=8nU0mc1DXwY
1733[*] https://www.youtube.com/watch?v=GgqQJnCBnSI
1734[*] https://www.youtube.com/watch?v=nTQ5MXlztRc
1735[*] https://www.youtube.com/watch?v=Tu6KNPMDxBIindividualson display***
1736[*] https://yougov.co.uk/news/2018/05/11/yougov-data-reveals-what-europeans-think-are-most-/
1737[*] http://www.americanthinker.com/articles/2017/10/muslim_brotherhood_political_infiltration_on_steroids.html
1738[*] http://www.americanthinker.com/articles/2018/01/what_i_learned_in_peace_corps_in_africa_trump_is_right.html#ixzz54WgEYJV3
1739[*] http://www.breitbart.com/big-government/2017/11/11/source-claims-financial-mismanagement-fraud-harassment-lutheran-immigration-refugee-service-spark-external-investigation/
1740[*] http://www.breitbart.com/london/2018/03/18/thousands-gather-londons-speakers-corner-hear-tommy-robinson-deliver-banned-right-wing-activists-speech/
1741[*] http://www.CitizensFortheStCroixValley.com/
1742[*] http://www.crowrivermedia.com/hutchinsonleader/news/local/welcoming-resolution-not-welcomed-in-hutchinson-here-s-what-people/article_5747a6ad-0d7b-54df-b182-fd9278c0f8ce.html
1743[*] http://www.fox9.com/news/minnesota-lawmakers-press-for-answers-on-daycare-fraud-investigation
1744[*] http://www.foxnews.com/world/2017/11/21/ap-probe-sexual-abuse-pervasive-in-pakistan-islamic-schools.html
1745[*] http://www.hudsonstarobserver.com/opinion/letters/4420938-viewpoint-whats-missing-critical-thinking
1746[*] http://www.maciverinstitute.com/2018/03/assembly-democrats-unveil-roadmap-to-permanently-change-constitution/
1747[*] http://www.maciverinstitute.com/2018/09/a-constitution-if-you-can-keep-it/
1748[*] http://www.postbulletin.com/news/politics/candidate-under-fire-for-calling-islam-antithesis-of-constitution/article_055d6618-0f3e-594d-a1cc-07eda9705e4c.html?utm_medium=social&utm_source=facebook&utm_campaign=user-share
1749[*] http://www.presspubs.com/opinion/columnists/article_b793059c-4795-5a55-abb3-03e9cbaa53af.html?utm_medium=social&utm_source=email&utm_campaign=user-share
1750[*] http://www.speroforum.com/a/VROILPQQFO29/75024-A-Catholic-perspective-on-the-immigration-debate#.Wg247EqnHIX
1751[*] http://www.startribune.com/st-cloud-council-member-pushes-for-moratorium-on-refugee-resettlement/455648873/
1752[*] http://www.wnd.com/2016/07/u-s-city-rolls-over-for-radical-mosque/
1753[*] http://www.wnd.com/2017/10/city-uses-dirty-play-to-squelch-citizen-revolt-over-refugees/
1754[INFO] GOOGLE has 111 results (0.24 seconds) about http://www.citizensforthestcroixvalley.com/
1755[INFO] BING shows 160.153.136.3 is shared with 31,300 hosts/vhosts
1756[INFO] Shodan detected the following opened ports on 160.153.136.3:
1757[*] 443
1758[*] 80
1759[INFO] ------VirusTotal SECTION------
1760[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
1761[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
1762[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
1763[INFO] ------Alexa Rank SECTION------
1764[INFO] Percent of Visitors Rank in Country:
1765[INFO] Percent of Search Traffic:
1766[INFO] Percent of Unique Visits:
1767[INFO] Total Sites Linking In:
1768[*] Total Sites
1769[INFO] Useful links related to www.citizensforthestcroixvalley.com - 160.153.136.3:
1770[*] https://www.virustotal.com/pt/ip-address/160.153.136.3/information/
1771[*] https://www.hybrid-analysis.com/search?host=160.153.136.3
1772[*] https://www.shodan.io/host/160.153.136.3
1773[*] https://www.senderbase.org/lookup/?search_string=160.153.136.3
1774[*] https://www.alienvault.com/open-threat-exchange/ip/160.153.136.3
1775[*] http://pastebin.com/search?q=160.153.136.3
1776[*] http://urlquery.net/search.php?q=160.153.136.3
1777[*] http://www.alexa.com/siteinfo/www.citizensforthestcroixvalley.com
1778[*] http://www.google.com/safebrowsing/diagnostic?site=www.citizensforthestcroixvalley.com
1779[*] https://censys.io/ipv4/160.153.136.3
1780[*] https://www.abuseipdb.com/check/160.153.136.3
1781[*] https://urlscan.io/search/#160.153.136.3
1782[*] https://github.com/search?q=160.153.136.3&type=Code
1783[INFO] Useful links related to AS26496 - 160.153.128.0/17:
1784[*] http://www.google.com/safebrowsing/diagnostic?site=AS:26496
1785[*] https://www.senderbase.org/lookup/?search_string=160.153.128.0/17
1786[*] http://bgp.he.net/AS26496
1787[*] https://stat.ripe.net/AS26496
1788[INFO] Date: 24/10/19 | Time: 18:08:07
1789[INFO] Total time: 1 minute(s) and 54 second(s)
1790######################################################################################################################################
1791Trying "citizensforthestcroixvalley.com"
1792;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40009
1793;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 2, ADDITIONAL: 4
1794
1795;; QUESTION SECTION:
1796;citizensforthestcroixvalley.com. IN ANY
1797
1798;; ANSWER SECTION:
1799citizensforthestcroixvalley.com. 600 IN TXT "NETORGFT2728187.onmicrosoft.com"
1800citizensforthestcroixvalley.com. 600 IN TXT "v=spf1 include:spf.protection.outlook.com -all"
1801citizensforthestcroixvalley.com. 600 IN MX 0 citizensforthestcroixvalley-com.mail.protection.outlook.com.
1802citizensforthestcroixvalley.com. 600 IN SOA ns49.domaincontrol.com. dns.jomax.net. 2019101008 28800 7200 604800 600
1803citizensforthestcroixvalley.com. 600 IN A 198.71.232.3
1804citizensforthestcroixvalley.com. 3600 IN NS ns50.domaincontrol.com.
1805citizensforthestcroixvalley.com. 3600 IN NS ns49.domaincontrol.com.
1806
1807;; AUTHORITY SECTION:
1808citizensforthestcroixvalley.com. 3600 IN NS ns50.domaincontrol.com.
1809citizensforthestcroixvalley.com. 3600 IN NS ns49.domaincontrol.com.
1810
1811;; ADDITIONAL SECTION:
1812ns49.domaincontrol.com. 18123 IN A 97.74.104.25
1813ns49.domaincontrol.com. 32590 IN AAAA 2603:5:2182::19
1814ns50.domaincontrol.com. 18450 IN A 173.201.72.25
1815ns50.domaincontrol.com. 18450 IN AAAA 2603:5:2282::19
1816
1817Received 457 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 144 ms
1818#####################################################################################################################################
1819; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace citizensforthestcroixvalley.com
1820;; global options: +cmd
1821. 79448 IN NS c.root-servers.net.
1822. 79448 IN NS e.root-servers.net.
1823. 79448 IN NS a.root-servers.net.
1824. 79448 IN NS i.root-servers.net.
1825. 79448 IN NS b.root-servers.net.
1826. 79448 IN NS f.root-servers.net.
1827. 79448 IN NS m.root-servers.net.
1828. 79448 IN NS h.root-servers.net.
1829. 79448 IN NS l.root-servers.net.
1830. 79448 IN NS g.root-servers.net.
1831. 79448 IN NS k.root-servers.net.
1832. 79448 IN NS d.root-servers.net.
1833. 79448 IN NS j.root-servers.net.
1834. 79448 IN RRSIG NS 8 0 518400 20191106170000 20191024160000 22545 . A+zuBIrCB00SLggnHhVG3YRodf5bYY3GBWGmpEpuHwWkvpA6h/01xgPx lpp8IsbTTRg7llCASsElmRSIMyCnGcvuphcmhr9r6/5L+oFIdLAHLztt mnrFVnWsOtlMCk758M/yNaRj9J1OPuiLcGF6vqTEOnlX7Ws/3/8bww44 d+zMdTpWNI4h324w0b4weiAMhQNiDGHV6qGncoAXEw1xQHEmJ6Klvanr gXqrSZhChZx4f7167+8EDrYdbx4yo1k474hFoKY3LRaVRj4LzW5rV5lE M4JLODgCrsVxme0AN4DDxlBn2TiE5fEPu3kGMWBFkBiwsxkPVeuAgEQ6 RRi5sQ==
1835;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 328 ms
1836
1837com. 172800 IN NS j.gtld-servers.net.
1838com. 172800 IN NS h.gtld-servers.net.
1839com. 172800 IN NS b.gtld-servers.net.
1840com. 172800 IN NS a.gtld-servers.net.
1841com. 172800 IN NS m.gtld-servers.net.
1842com. 172800 IN NS g.gtld-servers.net.
1843com. 172800 IN NS f.gtld-servers.net.
1844com. 172800 IN NS k.gtld-servers.net.
1845com. 172800 IN NS l.gtld-servers.net.
1846com. 172800 IN NS d.gtld-servers.net.
1847com. 172800 IN NS c.gtld-servers.net.
1848com. 172800 IN NS e.gtld-servers.net.
1849com. 172800 IN NS i.gtld-servers.net.
1850com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
1851com. 86400 IN RRSIG DS 8 1 86400 20191106170000 20191024160000 22545 . cLD0ibbSC3sgkvlNTxHPdMEI1pyUB8X9vAGwe3oHLLq1P5U185ZxTczE eLPKTW6MK/XMjSnIoZmpabmzJS3yK+8n3jDUDroU88oh7m4glBsI7C45 pXcCxfLTEq8aqop4j7PyemSbQ3XcXnAqmgA18sRvb2xXpxT202ogS3fo O4m+dQOuMsyHARn9G8WRf4jTtFLHwVy8HWPGU2GLKA+51OPsU2lQeNYr /M7+IULieVJL0fNuTOp65MLgTqqKdLRypybOUOd4RhXjoarjD8IA055c vf1qUA+1tO+LmMZbPbAD/SMo0+VJsmQYaLNaxbWiGayU3pGR4bQPvT0j 2oDMfg==
1852;; Received 1219 bytes from 2001:500:2::c#53(c.root-servers.net) in 32 ms
1853
1854citizensforthestcroixvalley.com. 172800 IN NS ns49.domaincontrol.com.
1855citizensforthestcroixvalley.com. 172800 IN NS ns50.domaincontrol.com.
1856CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
1857CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20191030044858 20191023033858 12163 com. jo4I4+uJa3M+FAMvZ0beahqyheyJ4AAItkcWUxzywt/ir5z7DVJ84mYv j8GH+Panqt3JTG2YyuFzvdWQus9jmnSr4oj6H+BUJQ4RFpPK7aPXm2Zb RZ8scWkVwsj8XTIaEZ9hYCgRMVp+xB9Mu5xL4WTQ/CgckN78B66lKkg3 1HfKXFiC1fuiu3Pf2f7QMXmlnZgrksSnCoHbsq3G7BtfVg==
1858H511LA2QDIFJHNVH046R565L2VHSRO9E.com. 86400 IN NSEC3 1 1 0 - H517E9C5APF88I7422GE671IG7OT9NDD NS DS RRSIG
1859H511LA2QDIFJHNVH046R565L2VHSRO9E.com. 86400 IN RRSIG NSEC3 8 2 86400 20191029055127 20191022044127 12163 com. Atl2+oGv3BOlszrPCYk83QQnTxgynAA4pSjWZjlrMmIndVe1x0yXbwmH Qn6uSpBSsPel1f1PpA1bMJkLnhS28DzJov6GDb6Ku3oje4F18aGnum9y 5A2UY0jr6tnri2yDQ5QWaVrCk0wF89fkI/iXEigiwU6uR+Cmx0vLsQVN /3MuUV1y4NCpqTqv++oRByL72ZKPcwbO1UxIvFcSg1/5vg==
1860;; Received 749 bytes from 2001:502:8cc::30#53(h.gtld-servers.net) in 39 ms
1861
1862citizensforthestcroixvalley.com. 600 IN A 198.71.232.3
1863citizensforthestcroixvalley.com. 3600 IN NS ns49.domaincontrol.com.
1864citizensforthestcroixvalley.com. 3600 IN NS ns50.domaincontrol.com.
1865;; Received 128 bytes from 2603:5:2282::19#53(ns50.domaincontrol.com) in 36 ms
1866#####################################################################################################################################
1867[*] Performing General Enumeration of Domain: citizensforthestcroixvalley.com
1868[-] DNSSEC is not configured for citizensforthestcroixvalley.com
1869[*] SOA ns49.domaincontrol.com 97.74.104.25
1870[*] NS ns49.domaincontrol.com 97.74.104.25
1871[*] NS ns49.domaincontrol.com 2603:5:2182::19
1872[*] NS ns50.domaincontrol.com 173.201.72.25
1873[*] NS ns50.domaincontrol.com 2603:5:2282::19
1874[*] A citizensforthestcroixvalley.com 160.153.136.3
1875[*] TXT citizensforthestcroixvalley.com NETORGFT2728187.onmicrosoft.com
1876[*] TXT citizensforthestcroixvalley.com v=spf1 include:spf.protection.outlook.com -all
1877[*] Enumerating SRV Records
1878[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 52.112.192.11 5061 1
1879[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 2603:1027::b 5061 1
1880[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 2603:1027:0:1::b 5061 1
1881[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 2603:1027:0:2::b 5061 1
1882[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 2603:1027:0:5::b 5061 1
1883[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 2603:1027:0:9::b 5061 1
1884[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 2603:1027:0:3::b 5061 1
1885[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 2603:1027:0:7::b 5061 1
1886[*] SRV _sipfederationtls._tcp.citizensforthestcroixvalley.com sipfed.online.lync.com 2603:1027:0:4::b 5061 1
1887[*] SRV _sip._tls.citizensforthestcroixvalley.com sipdir.online.lync.com 52.112.192.139 443 1
1888[*] SRV _sip._tls.citizensforthestcroixvalley.com sipdir.online.lync.com 2603:1027:0:3::b 443 1
1889[+] 11 Records Found
1890######################################################################################################################################
1891[*] Processing domain citizensforthestcroixvalley.com
1892[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
1893[+] Getting nameservers
189497.74.104.25 - ns49.domaincontrol.com
1895173.201.72.25 - ns50.domaincontrol.com
1896[-] Zone transfer failed
1897
1898[+] TXT records found
1899"NETORGFT2728187.onmicrosoft.com"
1900"v=spf1 include:spf.protection.outlook.com -all"
1901
1902[+] MX records found, added to target list
19030 citizensforthestcroixvalley-com.mail.protection.outlook.com.
1904
1905[*] Scanning citizensforthestcroixvalley.com for A records
1906160.153.136.3 - citizensforthestcroixvalley.com
190740.101.83.200 - autodiscover.citizensforthestcroixvalley.com
190852.97.176.40 - autodiscover.citizensforthestcroixvalley.com
190952.97.163.8 - autodiscover.citizensforthestcroixvalley.com
191052.97.144.184 - autodiscover.citizensforthestcroixvalley.com
191140.101.12.40 - autodiscover.citizensforthestcroixvalley.com
191252.97.170.40 - autodiscover.citizensforthestcroixvalley.com
191340.101.18.248 - autodiscover.citizensforthestcroixvalley.com
191452.97.183.200 - autodiscover.citizensforthestcroixvalley.com
1915cloudflare-resolve-to.citizensforthestcroixvalley.com enterpriseenrollment.citizensforthestcroixvalley.com 72.167.218.183 - email.citizensforthestcroixvalley.com
1916173.201.193.148 - email.citizensforthestcroixvalley.com
191772.167.218.55 - email.citizensforthestcroixvalley.com
191897.74.135.133 - email.citizensforthestcroixvalley.com
191945.40.130.41 - email.citizensforthestcroixvalley.com
192068.178.252.148 - email.citizensforthestcroixvalley.com
192172.167.218.173 - email.citizensforthestcroixvalley.com
192297.74.135.45 - email.citizensforthestcroixvalley.com
192368.178.252.133 - email.citizensforthestcroixvalley.com
1924173.201.192.148 - email.citizensforthestcroixvalley.com
192568.178.252.5 - email.citizensforthestcroixvalley.com
1926173.201.192.133 - email.citizensforthestcroixvalley.com
1927173.201.192.5 - email.citizensforthestcroixvalley.com
192845.40.130.40 - email.citizensforthestcroixvalley.com
192997.74.135.148 - email.citizensforthestcroixvalley.com
193072.167.218.45 - email.citizensforthestcroixvalley.com
1931173.201.193.20 - email.citizensforthestcroixvalley.com
193297.74.135.55 - email.citizensforthestcroixvalley.com
1933173.201.193.133 - email.citizensforthestcroixvalley.com
193468.178.252.20 - email.citizensforthestcroixvalley.com
1935173.201.192.20 - email.citizensforthestcroixvalley.com
1936173.201.193.5 - email.citizensforthestcroixvalley.com
193745.40.140.6 - email.citizensforthestcroixvalley.com
1938enterpriseregistration.citizensforthestcroixvalley.com 160.153.136.3 - ftp.citizensforthestcroixvalley.com
193952.112.193.16 - lyncdiscover.citizensforthestcroixvalley.com
194020.190.129.160 - msoid.citizensforthestcroixvalley.com
194140.126.1.130 - msoid.citizensforthestcroixvalley.com
194220.190.129.2 - msoid.citizensforthestcroixvalley.com
194340.126.1.128 - msoid.citizensforthestcroixvalley.com
194440.126.1.166 - msoid.citizensforthestcroixvalley.com
194552.112.194.75 - sip.citizensforthestcroixvalley.com
1946160.153.136.3 - www.citizensforthestcroixvalley.com
1947
1948#####################################################################################################################################
1949
1950 AVAILABLE PLUGINS
1951 -----------------
1952
1953 OpenSslCcsInjectionPlugin
1954 SessionRenegotiationPlugin
1955 SessionResumptionPlugin
1956 EarlyDataPlugin
1957 CertificateInfoPlugin
1958 HeartbleedPlugin
1959 RobotPlugin
1960 OpenSslCipherSuitesPlugin
1961 CompressionPlugin
1962 FallbackScsvPlugin
1963 HttpHeadersPlugin
1964
1965
1966
1967 CHECKING HOST(S) AVAILABILITY
1968 -----------------------------
1969
1970 160.153.136.3:443 => 160.153.136.3
1971
1972
1973
1974
1975 SCAN RESULTS FOR 160.153.136.3:443 - 160.153.136.3
1976 --------------------------------------------------
1977
1978 * Downgrade Attacks:
1979 TLS_FALLBACK_SCSV: OK - Supported
1980
1981 * Session Renegotiation:
1982 Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
1983 Secure Renegotiation: OK - Supported
1984
1985 * TLS 1.2 Session Resumption Support:
1986 With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
1987 With TLS Tickets: OK - Supported
1988
1989 * OpenSSL CCS Injection:
1990 OK - Not vulnerable to OpenSSL CCS injection
1991
1992 * SSLV2 Cipher Suites:
1993 Server rejected all cipher suites.
1994
1995 * TLSV1_3 Cipher Suites:
1996 Server rejected all cipher suites.
1997
1998 * Deflate Compression:
1999 OK - Compression disabled
2000
2001 * SSLV3 Cipher Suites:
2002 Server rejected all cipher suites.
2003
2004 * OpenSSL Heartbleed:
2005 OK - Not vulnerable to Heartbleed
2006
2007 * Certificate Information:
2008 Content
2009 SHA1 Fingerprint: 11788ec0058ca3d50644a3fed9c4636726d2fc1d
2010 Common Name: *.godaddysites.com
2011 Issuer: Go Daddy Secure Certificate Authority - G2
2012 Serial Number: 16026561006907939041
2013 Not Before: 2018-08-03 16:00:21
2014 Not After: 2020-08-03 16:00:21
2015 Signature Algorithm: sha256
2016 Public Key Algorithm: RSA
2017 Key Size: 2048
2018 Exponent: 65537 (0x10001)
2019 DNS Subject Alternative Names: ['*.godaddysites.com', 'godaddysites.com']
2020
2021 Trust
2022 Hostname Validation: FAILED - Certificate does NOT match 160.153.136.3
2023 Android CA Store (9.0.0_r9): OK - Certificate is trusted
2024 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
2025 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
2026 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
2027 Windows CA Store (2019-05-27): OK - Certificate is trusted
2028 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
2029 Received Chain: *.godaddysites.com --> Go Daddy Secure Certificate Authority - G2
2030 Verified Chain: *.godaddysites.com --> Go Daddy Secure Certificate Authority - G2 --> Go Daddy Root Certificate Authority - G2
2031 Received Chain Contains Anchor: OK - Anchor certificate not sent
2032 Received Chain Order: OK - Order is valid
2033 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
2034
2035 Extensions
2036 OCSP Must-Staple: NOT SUPPORTED - Extension not found
2037 Certificate Transparency: OK - 3 SCTs included
2038
2039 OCSP Stapling
2040 NOT SUPPORTED - Server did not send back an OCSP response
2041
2042 * TLSV1_1 Cipher Suites:
2043 Server rejected all cipher suites.
2044
2045 * TLSV1_2 Cipher Suites:
2046 Forward Secrecy OK - Supported
2047 RC4 OK - Not Supported
2048
2049 Preferred:
2050 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
2051 Accepted:
2052 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
2053 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 404 Not Found
2054 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
2055 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
2056 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
2057 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
2058 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 256 bits HTTP 404 Not Found
2059 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
2060 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 404 Not Found
2061 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
2062 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
2063 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
2064 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
2065
2066 * TLSV1 Cipher Suites:
2067 Server rejected all cipher suites.
2068
2069 * ROBOT Attack:
2070 OK - Not vulnerable
2071
2072
2073 SCAN COMPLETED IN 24.30 S
2074 -------------------------
2075#####################################################################################################################################
2076Parsero scan report for www.citizensforthestcroixvalley.com
2077http://www.citizensforthestcroixvalley.com/_tmpfileop/ 301 Moved Permanently
2078http://www.citizensforthestcroixvalley.com/cache/ 301 Moved Permanently
2079http://www.citizensforthestcroixvalley.com/stats/ 301 Moved Permanently
2080http://www.citizensforthestcroixvalley.com/mobile/ 301 Moved Permanently
2081http://www.citizensforthestcroixvalley.com/Flash/ 301 Moved Permanently
2082http://www.citizensforthestcroixvalley.com/plugins/ 301 Moved Permanently
2083http://www.citizensforthestcroixvalley.com/_mygallery/ 301 Moved Permanently
2084http://www.citizensforthestcroixvalley.com/dbboon/ 301 Moved Permanently
2085http://www.citizensforthestcroixvalley.com/statshistory/ 301 Moved Permanently
2086http://www.citizensforthestcroixvalley.com/QSC/ 301 Moved Permanently
2087http://www.citizensforthestcroixvalley.com/images/ 301 Moved Permanently
2088http://www.citizensforthestcroixvalley.com/_backup/ 301 Moved Permanently
2089http://www.citizensforthestcroixvalley.com/_temp/ 301 Moved Permanently
2090http://www.citizensforthestcroixvalley.com/scripts/ 301 Moved Permanently
2091http://www.citizensforthestcroixvalley.com/_tempalbums/ 301 Moved Permanently
2092
2093[+] 15 links have been analyzed but any them are available.
2094#####################################################################################################################################
2095
2096Domains still to check: 1
2097 Checking if the hostname citizensforthestcroixvalley.com. given is in fact a domain...
2098
2099Analyzing domain: citizensforthestcroixvalley.com.
2100 Checking NameServers using system default resolver...
2101 IP: 97.74.104.25 (United States)
2102 HostName: ns49.domaincontrol.com Type: NS
2103 HostName: ns49.domaincontrol.com Type: PTR
2104 IP: 173.201.72.25 (United States)
2105 HostName: ns50.domaincontrol.com Type: NS
2106 HostName: ns50.domaincontrol.com Type: PTR
2107
2108 Checking MailServers using system default resolver...
2109 WARNING!! There are no MX records for this domain
2110
2111 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
2112 No zone transfer found on nameserver 173.201.72.25
2113 No zone transfer found on nameserver 97.74.104.25
2114
2115 Checking SPF record...
2116
2117 Checking SPF record...
2118 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
2119 New IP found: 40.92.0.0
2120 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
2121 New IP found: 40.107.0.0
2122 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
2123 New IP found: 52.100.0.0
2124 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
2125 New IP found: 104.47.0.0
2126 There are no IPv4 addresses in the SPF. Maybe IPv6.
2127 There are no IPv4 addresses in the SPF. Maybe IPv6.
2128
2129 Checking 192 most common hostnames using system default resolver...
2130 IP: 160.153.136.3 (United States)
2131 HostName: www.citizensforthestcroixvalley.com. Type: A
2132 IP: 160.153.136.3 (United States)
2133 HostName: www.citizensforthestcroixvalley.com. Type: A
2134 HostName: ftp.citizensforthestcroixvalley.com. Type: A
2135 HostName: ip-160-153-136-3.ip.secureserver.net Type: PTR
2136
2137 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
2138 Checking netblock 52.100.0.0
2139 Checking netblock 104.47.0.0
2140 Checking netblock 160.153.136.0
2141 Checking netblock 173.201.72.0
2142 Checking netblock 40.107.0.0
2143 Checking netblock 97.74.104.0
2144 Checking netblock 40.92.0.0
2145
2146 Searching for citizensforthestcroixvalley.com. emails in Google
2147
2148 Checking 7 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
2149 Host 52.100.0.0 is up (reset ttl 64)
2150 Host 104.47.0.0 is up (reset ttl 64)
2151 Host 160.153.136.3 is up (reset ttl 64)
2152 Host 173.201.72.25 is up (reset ttl 64)
2153 Host 40.107.0.0 is up (reset ttl 64)
2154 Host 97.74.104.25 is up (reset ttl 64)
2155 Host 40.92.0.0 is up (reset ttl 64)
2156
2157 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
2158 Scanning ip 52.100.0.0 ():
2159 Scanning ip 104.47.0.0 ():
2160 Scanning ip 160.153.136.3 (ip-160-153-136-3.ip.secureserver.net (PTR)):
2161 80/tcp open http syn-ack ttl 52 Samsung AllShare httpd
2162 | http-methods:
2163 |_ Supported Methods: GET HEAD POST OPTIONS
2164 |_http-server-header: DPS/1.6.13
2165 |_http-title: Site doesn't have a title.
2166 443/tcp open ssl/http syn-ack ttl 52 Samsung AllShare httpd
2167 | http-methods:
2168 |_ Supported Methods: GET HEAD POST OPTIONS
2169 |_http-server-header: DPS/1.6.13
2170 |_http-title: Site doesn't have a title.
2171 | ssl-cert: Subject: commonName=*.godaddysites.com
2172 | Subject Alternative Name: DNS:*.godaddysites.com, DNS:godaddysites.com
2173 | Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
2174 | Public Key type: rsa
2175 | Public Key bits: 2048
2176 | Signature Algorithm: sha256WithRSAEncryption
2177 | Not valid before: 2018-08-03T16:00:21
2178 | Not valid after: 2020-08-03T16:00:21
2179 | MD5: 0cb0 4cf0 32a8 b22b aea7 9873 dae5 5d65
2180 |_SHA-1: 1178 8ec0 058c a3d5 0644 a3fe d9c4 6367 26d2 fc1d
2181 |_ssl-date: TLS randomness does not represent time
2182 | tls-alpn:
2183 | h2
2184 |_ http/1.1
2185 Scanning ip 173.201.72.25 (ns50.domaincontrol.com (PTR)):
2186 53/tcp open tcpwrapped syn-ack ttl 55
2187 Scanning ip 40.107.0.0 ():
2188 Scanning ip 97.74.104.25 (ns49.domaincontrol.com (PTR)):
2189 53/tcp open tcpwrapped syn-ack ttl 55
2190 Scanning ip 40.92.0.0 ():
2191 WebCrawling domain's web servers... up to 50 max links.
2192
2193 + URL to crawl: http://www.citizensforthestcroixvalley.com.
2194 + Date: 2019-10-24
2195
2196 + Crawling URL: http://www.citizensforthestcroixvalley.com.:
2197 + Links:
2198 + Crawling http://www.citizensforthestcroixvalley.com. (404 Not Found)
2199 + Searching for directories...
2200 + Searching open folders...
2201
2202
2203 + URL to crawl: http://ftp.citizensforthestcroixvalley.com.
2204 + Date: 2019-10-24
2205
2206 + Crawling URL: http://ftp.citizensforthestcroixvalley.com.:
2207 + Links:
2208 + Crawling http://ftp.citizensforthestcroixvalley.com. (404 Not Found)
2209 + Searching for directories...
2210 + Searching open folders...
2211
2212
2213 + URL to crawl: https://www.citizensforthestcroixvalley.com.
2214 + Date: 2019-10-24
2215
2216 + Crawling URL: https://www.citizensforthestcroixvalley.com.:
2217 + Links:
2218 + Crawling https://www.citizensforthestcroixvalley.com.
2219 + Searching for directories...
2220 + Searching open folders...
2221
2222
2223 + URL to crawl: https://ftp.citizensforthestcroixvalley.com.
2224 + Date: 2019-10-24
2225
2226 + Crawling URL: https://ftp.citizensforthestcroixvalley.com.:
2227 + Links:
2228 + Crawling https://ftp.citizensforthestcroixvalley.com.
2229 + Searching for directories...
2230 + Searching open folders...
2231
2232--Finished--
2233Summary information for domain citizensforthestcroixvalley.com.
2234-----------------------------------------
2235
2236 Domain Ips Information:
2237 IP: 52.100.0.0
2238 Type: SPF
2239 Is Active: True (reset ttl 64)
2240 IP: 104.47.0.0
2241 Type: SPF
2242 Is Active: True (reset ttl 64)
2243 IP: 160.153.136.3
2244 HostName: www.citizensforthestcroixvalley.com. Type: A
2245 HostName: ftp.citizensforthestcroixvalley.com. Type: A
2246 HostName: ip-160-153-136-3.ip.secureserver.net Type: PTR
2247 Country: United States
2248 Is Active: True (reset ttl 64)
2249 Port: 80/tcp open http syn-ack ttl 52 Samsung AllShare httpd
2250 Script Info: | http-methods:
2251 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
2252 Script Info: |_http-server-header: DPS/1.6.13
2253 Script Info: |_http-title: Site doesn't have a title.
2254 Port: 443/tcp open ssl/http syn-ack ttl 52 Samsung AllShare httpd
2255 Script Info: | http-methods:
2256 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
2257 Script Info: |_http-server-header: DPS/1.6.13
2258 Script Info: |_http-title: Site doesn't have a title.
2259 Script Info: | ssl-cert: Subject: commonName=*.godaddysites.com
2260 Script Info: | Subject Alternative Name: DNS:*.godaddysites.com, DNS:godaddysites.com
2261 Script Info: | Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
2262 Script Info: | Public Key type: rsa
2263 Script Info: | Public Key bits: 2048
2264 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2265 Script Info: | Not valid before: 2018-08-03T16:00:21
2266 Script Info: | Not valid after: 2020-08-03T16:00:21
2267 Script Info: | MD5: 0cb0 4cf0 32a8 b22b aea7 9873 dae5 5d65
2268 Script Info: |_SHA-1: 1178 8ec0 058c a3d5 0644 a3fe d9c4 6367 26d2 fc1d
2269 Script Info: |_ssl-date: TLS randomness does not represent time
2270 Script Info: | tls-alpn:
2271 Script Info: | h2
2272 Script Info: |_ http/1.1
2273 IP: 173.201.72.25
2274 HostName: ns50.domaincontrol.com Type: NS
2275 HostName: ns50.domaincontrol.com Type: PTR
2276 Country: United States
2277 Is Active: True (reset ttl 64)
2278 Port: 53/tcp open tcpwrapped syn-ack ttl 55
2279 IP: 40.107.0.0
2280 Type: SPF
2281 Is Active: True (reset ttl 64)
2282 IP: 97.74.104.25
2283 HostName: ns49.domaincontrol.com Type: NS
2284 HostName: ns49.domaincontrol.com Type: PTR
2285 Country: United States
2286 Is Active: True (reset ttl 64)
2287 Port: 53/tcp open tcpwrapped syn-ack ttl 55
2288 IP: 40.92.0.0
2289 Type: SPF
2290 Is Active: True (reset ttl 64)
2291####################################################################################################################################
2292dnsenum VERSION:1.2.6
2293
2294----- www.citizensforthestcroixvalley.com -----
2295
2296
2297Host's addresses:
2298__________________
2299
2300citizensforthestcroixvalley.com. 599 IN A 160.153.136.3
2301
2302
2303Name Servers:
2304______________
2305
2306ns49.domaincontrol.com. 85229 IN A 97.74.104.25
2307ns50.domaincontrol.com. 85240 IN A 173.201.72.25
2308
2309
2310Mail (MX) Servers:
2311___________________
2312
2313
2314
2315Trying Zone Transfers and getting Bind Versions:
2316_________________________________________________
2317
2318
2319Trying Zone Transfer for www.citizensforthestcroixvalley.com on ns49.domaincontrol.com ...
2320
2321Trying Zone Transfer for www.citizensforthestcroixvalley.com on ns50.domaincontrol.com ...
2322
2323
2324Brute forcing with /usr/share/dnsenum/dns.txt:
2325_______________________________________________
2326
2327
2328
2329www.citizensforthestcroixvalley.com class C netranges:
2330_______________________________________________________
2331
2332
2333
2334Performing reverse lookup on 0 ip addresses:
2335_____________________________________________
2336
2337
23380 results out of 0 IP addresses.
2339
2340
2341www.citizensforthestcroixvalley.com ip blocks:
2342_______________________________________________
2343
2344
2345done.
2346#####################################################################################################################################
2347[*] Processing domain www.citizensforthestcroixvalley.com
2348[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
2349[+] Getting nameservers
235097.74.104.25 - ns49.domaincontrol.com
2351173.201.72.25 - ns50.domaincontrol.com
2352[-] Zone transfer failed
2353
2354[+] TXT records found
2355"v=spf1 include:spf.protection.outlook.com -all"
2356"NETORGFT2728187.onmicrosoft.com"
2357
2358[+] MX records found, added to target list
23590 citizensforthestcroixvalley-com.mail.protection.outlook.com.
2360
2361[*] Scanning www.citizensforthestcroixvalley.com for A records
2362160.153.136.3 - www.citizensforthestcroixvalley.com
2363####################################################################################################################################
2364Privileges have been dropped to "nobody:nogroup" for security reasons.
2365
2366Processed queries: 0
2367Received packets: 0
2368Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
2369Current incoming rate: 0 pps, average: 0 pps
2370Current success rate: 0 pps, average: 0 pps
2371Finished total: 0, success: 0 (0.00%)
2372Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
2373Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2374Response: | Success: | Total:
2375OK: | 0 ( 0.00%) | 0 ( 0.00%)
2376NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
2377SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
2378REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
2379FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2380
2381
2382
2383Processed queries: 1919
2384Received packets: 301
2385Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
2386Current incoming rate: 300 pps, average: 300 pps
2387Current success rate: 214 pps, average: 214 pps
2388Finished total: 215, success: 215 (100.00%)
2389Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
2390Failures: 0: 37.21%, 1: 816.74%, 2: 38.60%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2391Response: | Success: | Total:
2392OK: | 18 ( 8.37%) | 18 ( 6.04%)
2393NXDOMAIN: | 180 ( 83.72%) | 180 ( 60.40%)
2394SERVFAIL: | 17 ( 7.91%) | 17 ( 5.70%)
2395REFUSED: | 0 ( 0.00%) | 83 ( 27.85%)
2396FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2397
2398
2399
2400Processed queries: 1919
2401Received packets: 685
2402Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
2403Current incoming rate: 383 pps, average: 341 pps
2404Current success rate: 280 pps, average: 247 pps
2405Finished total: 496, success: 496 (100.00%)
2406Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
2407Failures: 0: 16.13%, 1: 27.22%, 2: 28.43%, 3: 278.63%, 4: 36.49%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2408Response: | Success: | Total:
2409OK: | 43 ( 8.67%) | 43 ( 6.35%)
2410NXDOMAIN: | 424 ( 85.48%) | 424 ( 62.63%)
2411SERVFAIL: | 29 ( 5.85%) | 29 ( 4.28%)
2412REFUSED: | 0 ( 0.00%) | 181 ( 26.74%)
2413FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2414
2415
2416
2417Processed queries: 1919
2418Received packets: 1037
2419Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
2420Current incoming rate: 351 pps, average: 345 pps
2421Current success rate: 269 pps, average: 254 pps
2422Finished total: 766, success: 766 (100.00%)
2423Mismatched domains: 1 (0.10%), IDs: 0 (0.00%)
2424Failures: 0: 10.44%, 1: 17.62%, 2: 18.41%, 3: 18.28%, 4: 18.41%, 5: 133.94%, 6: 33.42%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2425Response: | Success: | Total:
2426OK: | 66 ( 8.62%) | 66 ( 6.44%)
2427NXDOMAIN: | 657 ( 85.77%) | 657 ( 64.10%)
2428SERVFAIL: | 43 ( 5.61%) | 44 ( 4.29%)
2429REFUSED: | 0 ( 0.00%) | 258 ( 25.17%)
2430FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2431
2432
2433
2434Processed queries: 1919
2435Received packets: 1392
2436Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
2437Current incoming rate: 354 pps, average: 347 pps
2438Current success rate: 233 pps, average: 249 pps
2439Finished total: 1000, success: 1000 (100.00%)
2440Mismatched domains: 37 (2.68%), IDs: 0 (0.00%)
2441Failures: 0: 8.00%, 1: 13.50%, 2: 14.10%, 3: 14.00%, 4: 14.10%, 5: 13.50%, 6: 12.70%, 7: 70.40%, 8: 31.30%, 9: 0.30%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2442Response: | Success: | Total:
2443OK: | 85 ( 8.50%) | 87 ( 6.30%)
2444NXDOMAIN: | 860 ( 86.00%) | 884 ( 64.06%)
2445SERVFAIL: | 55 ( 5.50%) | 57 ( 4.13%)
2446REFUSED: | 0 ( 0.00%) | 352 ( 25.51%)
2447FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2448
2449
2450
2451Processed queries: 1919
2452Received packets: 1783
2453Progress: 100.00% (00 h 00 min 05 sec / 00 h 00 min 05 sec)
2454Current incoming rate: 390 pps, average: 355 pps
2455Current success rate: 146 pps, average: 228 pps
2456Finished total: 1147, success: 1147 (100.00%)
2457Mismatched domains: 220 (12.44%), IDs: 0 (0.00%)
2458Failures: 0: 6.97%, 1: 11.77%, 2: 12.29%, 3: 12.21%, 4: 12.29%, 5: 11.77%, 6: 11.07%, 7: 8.28%, 8: 6.19%, 9: 47.25%, 10: 26.16%, 11: 1.05%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2459Response: | Success: | Total:
2460OK: | 94 ( 8.20%) | 109 ( 6.17%)
2461NXDOMAIN: | 991 ( 86.40%) | 1129 ( 63.86%)
2462SERVFAIL: | 62 ( 5.41%) | 72 ( 4.07%)
2463REFUSED: | 0 ( 0.00%) | 458 ( 25.90%)
2464FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2465
2466
2467
2468Processed queries: 1919
2469Received packets: 2146
2470Progress: 100.00% (00 h 00 min 06 sec / 00 h 00 min 06 sec)
2471Current incoming rate: 362 pps, average: 357 pps
2472Current success rate: 130 pps, average: 212 pps
2473Finished total: 1278, success: 1278 (100.00%)
2474Mismatched domains: 401 (18.84%), IDs: 0 (0.00%)
2475Failures: 0: 6.26%, 1: 10.56%, 2: 11.03%, 3: 10.95%, 4: 11.03%, 5: 10.56%, 6: 9.94%, 7: 7.43%, 8: 5.56%, 9: 5.56%, 10: 5.63%, 11: 31.85%, 12: 22.22%, 13: 1.56%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2476Response: | Success: | Total:
2477OK: | 104 ( 8.14%) | 126 ( 5.92%)
2478NXDOMAIN: | 1109 ( 86.78%) | 1357 ( 63.74%)
2479SERVFAIL: | 65 ( 5.09%) | 84 ( 3.95%)
2480REFUSED: | 0 ( 0.00%) | 562 ( 26.40%)
2481FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2482
2483
2484
2485Processed queries: 1919
2486Received packets: 2520
2487Progress: 100.00% (00 h 00 min 07 sec / 00 h 00 min 07 sec)
2488Current incoming rate: 373 pps, average: 359 pps
2489Current success rate: 135 pps, average: 201 pps
2490Finished total: 1414, success: 1414 (100.00%)
2491Mismatched domains: 591 (23.62%), IDs: 0 (0.00%)
2492Failures: 0: 5.66%, 1: 9.55%, 2: 9.97%, 3: 9.90%, 4: 9.97%, 5: 9.55%, 6: 8.98%, 7: 6.72%, 8: 5.02%, 9: 5.02%, 10: 5.09%, 11: 4.24%, 12: 5.02%, 13: 21.29%, 14: 17.89%, 15: 1.77%, 16: 0.07%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2493Response: | Success: | Total:
2494OK: | 115 ( 8.13%) | 149 ( 5.96%)
2495NXDOMAIN: | 1226 ( 86.70%) | 1583 ( 63.27%)
2496SERVFAIL: | 73 ( 5.16%) | 103 ( 4.12%)
2497REFUSED: | 0 ( 0.00%) | 667 ( 26.66%)
2498FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2499
2500
2501
2502Processed queries: 1919
2503Received packets: 2889
2504Progress: 100.00% (00 h 00 min 08 sec / 00 h 00 min 08 sec)
2505Current incoming rate: 368 pps, average: 360 pps
2506Current success rate: 89 pps, average: 187 pps
2507Finished total: 1504, success: 1504 (100.00%)
2508Mismatched domains: 846 (29.49%), IDs: 0 (0.00%)
2509Failures: 0: 5.32%, 1: 8.98%, 2: 9.38%, 3: 9.31%, 4: 9.38%, 5: 8.98%, 6: 8.44%, 7: 6.32%, 8: 4.72%, 9: 4.72%, 10: 4.79%, 11: 3.99%, 12: 4.72%, 13: 3.86%, 14: 3.92%, 15: 14.83%, 16: 14.30%, 17: 1.60%, 18: 0.07%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2510Response: | Success: | Total:
2511OK: | 122 ( 8.11%) | 171 ( 5.96%)
2512NXDOMAIN: | 1307 ( 86.90%) | 1824 ( 63.58%)
2513SERVFAIL: | 75 ( 4.99%) | 114 ( 3.97%)
2514REFUSED: | 0 ( 0.00%) | 760 ( 26.49%)
2515FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2516
2517
2518
2519Processed queries: 1919
2520Received packets: 3231
2521Progress: 100.00% (00 h 00 min 09 sec / 00 h 00 min 09 sec)
2522Current incoming rate: 341 pps, average: 358 pps
2523Current success rate: 67 pps, average: 174 pps
2524Finished total: 1572, success: 1572 (100.00%)
2525Mismatched domains: 1094 (34.09%), IDs: 0 (0.00%)
2526Failures: 0: 5.09%, 1: 8.59%, 2: 8.97%, 3: 8.91%, 4: 8.97%, 5: 8.59%, 6: 8.08%, 7: 6.04%, 8: 4.52%, 9: 4.52%, 10: 4.58%, 11: 3.82%, 12: 4.52%, 13: 3.69%, 14: 3.75%, 15: 2.48%, 16: 2.10%, 17: 10.94%, 18: 12.34%, 19: 1.53%, 20: 0.06%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2527Response: | Success: | Total:
2528OK: | 130 ( 8.27%) | 199 ( 6.20%)
2529NXDOMAIN: | 1366 ( 86.90%) | 2046 ( 63.76%)
2530SERVFAIL: | 76 ( 4.83%) | 125 ( 3.90%)
2531REFUSED: | 0 ( 0.00%) | 839 ( 26.15%)
2532FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2533
2534
2535
2536Processed queries: 1919
2537Received packets: 3604
2538Progress: 100.00% (00 h 00 min 10 sec / 00 h 00 min 10 sec)
2539Current incoming rate: 372 pps, average: 359 pps
2540Current success rate: 77 pps, average: 164 pps
2541Finished total: 1650, success: 1650 (100.00%)
2542Mismatched domains: 1367 (38.20%), IDs: 0 (0.00%)
2543Failures: 0: 4.85%, 1: 8.18%, 2: 8.55%, 3: 8.48%, 4: 8.55%, 5: 8.18%, 6: 7.70%, 7: 5.76%, 8: 4.30%, 9: 4.30%, 10: 4.36%, 11: 3.64%, 12: 4.30%, 13: 3.52%, 14: 3.58%, 15: 2.36%, 16: 2.00%, 17: 2.30%, 18: 2.18%, 19: 9.03%, 20: 8.85%, 21: 1.27%, 22: 0.06%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2544Response: | Success: | Total:
2545OK: | 135 ( 8.18%) | 223 ( 6.23%)
2546NXDOMAIN: | 1436 ( 87.03%) | 2287 ( 63.90%)
2547SERVFAIL: | 79 ( 4.79%) | 135 ( 3.77%)
2548REFUSED: | 0 ( 0.00%) | 934 ( 26.10%)
2549FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2550
2551
2552
2553Processed queries: 1919
2554Received packets: 4007
2555Progress: 100.00% (00 h 00 min 11 sec / 00 h 00 min 11 sec)
2556Current incoming rate: 402 pps, average: 363 pps
2557Current success rate: 33 pps, average: 152 pps
2558Finished total: 1684, success: 1684 (100.00%)
2559Mismatched domains: 1718 (43.20%), IDs: 0 (0.00%)
2560Failures: 0: 4.75%, 1: 8.02%, 2: 8.37%, 3: 8.31%, 4: 8.37%, 5: 8.02%, 6: 7.54%, 7: 5.64%, 8: 4.22%, 9: 4.22%, 10: 4.28%, 11: 3.56%, 12: 4.22%, 13: 3.44%, 14: 3.50%, 15: 2.32%, 16: 1.96%, 17: 2.26%, 18: 2.14%, 19: 2.20%, 20: 0.95%, 21: 7.42%, 22: 7.19%, 23: 0.95%, 24: 0.12%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2561Response: | Success: | Total:
2562OK: | 136 ( 8.08%) | 258 ( 6.49%)
2563NXDOMAIN: | 1467 ( 87.11%) | 2523 ( 63.44%)
2564SERVFAIL: | 81 ( 4.81%) | 146 ( 3.67%)
2565REFUSED: | 0 ( 0.00%) | 1050 ( 26.40%)
2566FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2567
2568
2569
2570Processed queries: 1919
2571Received packets: 4359
2572Progress: 100.00% (00 h 00 min 12 sec / 00 h 00 min 12 sec)
2573Current incoming rate: 351 pps, average: 362 pps
2574Current success rate: 29 pps, average: 142 pps
2575Finished total: 1714, success: 1714 (100.00%)
2576Mismatched domains: 2028 (46.87%), IDs: 0 (0.00%)
2577Failures: 0: 4.67%, 1: 7.88%, 2: 8.23%, 3: 8.17%, 4: 8.23%, 5: 7.88%, 6: 7.41%, 7: 5.54%, 8: 4.14%, 9: 4.14%, 10: 4.20%, 11: 3.50%, 12: 4.14%, 13: 3.38%, 14: 3.44%, 15: 2.28%, 16: 1.93%, 17: 2.22%, 18: 2.10%, 19: 2.16%, 20: 0.93%, 21: 0.93%, 22: 1.11%, 23: 7.12%, 24: 5.37%, 25: 0.82%, 26: 0.06%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2578Response: | Success: | Total:
2579OK: | 138 ( 8.05%) | 277 ( 6.40%)
2580NXDOMAIN: | 1494 ( 87.16%) | 2746 ( 63.46%)
2581SERVFAIL: | 82 ( 4.78%) | 159 ( 3.67%)
2582REFUSED: | 0 ( 0.00%) | 1145 ( 26.46%)
2583FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2584
2585
2586
2587Processed queries: 1919
2588Received packets: 4710
2589Progress: 100.00% (00 h 00 min 13 sec / 00 h 00 min 13 sec)
2590Current incoming rate: 350 pps, average: 361 pps
2591Current success rate: 25 pps, average: 133 pps
2592Finished total: 1740, success: 1740 (100.00%)
2593Mismatched domains: 2345 (50.14%), IDs: 0 (0.00%)
2594Failures: 0: 4.60%, 1: 7.76%, 2: 8.10%, 3: 8.05%, 4: 8.10%, 5: 7.76%, 6: 7.30%, 7: 5.46%, 8: 4.08%, 9: 4.08%, 10: 4.14%, 11: 3.45%, 12: 4.08%, 13: 3.33%, 14: 3.39%, 15: 2.24%, 16: 1.90%, 17: 2.18%, 18: 2.07%, 19: 2.13%, 20: 0.92%, 21: 0.92%, 22: 1.09%, 23: 0.69%, 24: 0.80%, 25: 6.95%, 26: 4.08%, 27: 0.57%, 28: 0.06%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2595Response: | Success: | Total:
2596OK: | 142 ( 8.16%) | 301 ( 6.44%)
2597NXDOMAIN: | 1514 ( 87.01%) | 2974 ( 63.59%)
2598SERVFAIL: | 84 ( 4.83%) | 166 ( 3.55%)
2599REFUSED: | 0 ( 0.00%) | 1236 ( 26.43%)
2600FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2601
2602
2603
2604Processed queries: 1919
2605Received packets: 5080
2606Progress: 100.00% (00 h 00 min 14 sec / 00 h 00 min 14 sec)
2607Current incoming rate: 369 pps, average: 362 pps
2608Current success rate: 21 pps, average: 125 pps
2609Finished total: 1762, success: 1762 (100.00%)
2610Mismatched domains: 2685 (53.22%), IDs: 0 (0.00%)
2611Failures: 0: 4.54%, 1: 7.66%, 2: 8.00%, 3: 7.95%, 4: 8.00%, 5: 7.66%, 6: 7.21%, 7: 5.39%, 8: 4.03%, 9: 4.03%, 10: 4.09%, 11: 3.41%, 12: 4.03%, 13: 3.29%, 14: 3.35%, 15: 2.21%, 16: 1.87%, 17: 2.16%, 18: 2.04%, 19: 2.10%, 20: 0.91%, 21: 0.91%, 22: 1.08%, 23: 0.68%, 24: 0.79%, 25: 0.85%, 26: 0.62%, 27: 6.64%, 28: 3.01%, 29: 0.34%, 30: 0.06%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2612Response: | Success: | Total:
2613OK: | 144 ( 8.17%) | 326 ( 6.46%)
2614NXDOMAIN: | 1534 ( 87.06%) | 3196 ( 63.35%)
2615SERVFAIL: | 84 ( 4.77%) | 177 ( 3.51%)
2616REFUSED: | 0 ( 0.00%) | 1346 ( 26.68%)
2617FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2618
2619
2620
2621Processed queries: 1919
2622Received packets: 5446
2623Progress: 100.00% (00 h 00 min 15 sec / 00 h 00 min 15 sec)
2624Current incoming rate: 365 pps, average: 362 pps
2625Current success rate: 21 pps, average: 118 pps
2626Finished total: 1784, success: 1784 (100.00%)
2627Mismatched domains: 3023 (55.88%), IDs: 0 (0.00%)
2628Failures: 0: 4.48%, 1: 7.57%, 2: 7.90%, 3: 7.85%, 4: 7.90%, 5: 7.57%, 6: 7.12%, 7: 5.33%, 8: 3.98%, 9: 3.98%, 10: 4.04%, 11: 3.36%, 12: 3.98%, 13: 3.25%, 14: 3.31%, 15: 2.19%, 16: 1.85%, 17: 2.13%, 18: 2.02%, 19: 2.07%, 20: 0.90%, 21: 0.90%, 22: 1.07%, 23: 0.67%, 24: 0.78%, 25: 0.84%, 26: 0.62%, 27: 0.62%, 28: 0.73%, 29: 6.45%, 30: 1.85%, 31: 0.28%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2629Response: | Success: | Total:
2630OK: | 145 ( 8.13%) | 346 ( 6.40%)
2631NXDOMAIN: | 1554 ( 87.11%) | 3440 ( 63.59%)
2632SERVFAIL: | 85 ( 4.76%) | 185 ( 3.42%)
2633REFUSED: | 0 ( 0.00%) | 1439 ( 26.60%)
2634FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2635
2636
2637
2638Processed queries: 1919
2639Received packets: 5793
2640Progress: 100.00% (00 h 00 min 16 sec / 00 h 00 min 16 sec)
2641Current incoming rate: 346 pps, average: 361 pps
2642Current success rate: 13 pps, average: 112 pps
2643Finished total: 1798, success: 1798 (100.00%)
2644Mismatched domains: 3350 (58.21%), IDs: 0 (0.00%)
2645Failures: 0: 4.45%, 1: 7.51%, 2: 7.84%, 3: 7.79%, 4: 7.84%, 5: 7.51%, 6: 7.06%, 7: 5.28%, 8: 3.95%, 9: 3.95%, 10: 4.00%, 11: 3.34%, 12: 3.95%, 13: 3.23%, 14: 3.28%, 15: 2.17%, 16: 1.84%, 17: 2.11%, 18: 2.00%, 19: 2.06%, 20: 0.89%, 21: 0.89%, 22: 1.06%, 23: 0.67%, 24: 0.78%, 25: 0.83%, 26: 0.61%, 27: 0.61%, 28: 0.72%, 29: 0.67%, 30: 0.44%, 31: 5.84%, 32: 1.45%, 33: 0.11%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2646Response: | Success: | Total:
2647OK: | 147 ( 8.18%) | 369 ( 6.41%)
2648NXDOMAIN: | 1565 ( 87.04%) | 3654 ( 63.49%)
2649SERVFAIL: | 86 ( 4.78%) | 196 ( 3.41%)
2650REFUSED: | 0 ( 0.00%) | 1536 ( 26.69%)
2651FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2652
2653
2654
2655Processed queries: 1919
2656Received packets: 6148
2657Progress: 100.00% (00 h 00 min 17 sec / 00 h 00 min 17 sec)
2658Current incoming rate: 354 pps, average: 360 pps
2659Current success rate: 30 pps, average: 107 pps
2660Finished total: 1829, success: 1829 (100.00%)
2661Mismatched domains: 3654 (59.82%), IDs: 0 (0.00%)
2662Failures: 0: 4.37%, 1: 7.38%, 2: 7.71%, 3: 7.65%, 4: 7.71%, 5: 7.38%, 6: 6.94%, 7: 5.19%, 8: 3.88%, 9: 3.88%, 10: 3.94%, 11: 3.28%, 12: 3.88%, 13: 3.17%, 14: 3.23%, 15: 2.13%, 16: 1.80%, 17: 2.08%, 18: 1.97%, 19: 2.02%, 20: 0.87%, 21: 0.87%, 22: 1.04%, 23: 0.66%, 24: 0.77%, 25: 0.82%, 26: 0.60%, 27: 0.60%, 28: 0.71%, 29: 0.66%, 30: 0.44%, 31: 0.33%, 32: 0.60%, 33: 4.92%, 34: 1.20%, 35: 0.22%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2663Response: | Success: | Total:
2664OK: | 149 ( 8.15%) | 387 ( 6.34%)
2665NXDOMAIN: | 1593 ( 87.10%) | 3876 ( 63.46%)
2666SERVFAIL: | 87 ( 4.76%) | 202 ( 3.31%)
2667REFUSED: | 0 ( 0.00%) | 1643 ( 26.90%)
2668FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2669
2670
2671
2672Processed queries: 1919
2673Received packets: 6513
2674Progress: 100.00% (00 h 00 min 18 sec / 00 h 00 min 18 sec)
2675Current incoming rate: 364 pps, average: 361 pps
2676Current success rate: 44 pps, average: 103 pps
2677Finished total: 1874, success: 1874 (100.00%)
2678Mismatched domains: 3954 (61.12%), IDs: 0 (0.00%)
2679Failures: 0: 4.27%, 1: 7.20%, 2: 7.52%, 3: 7.47%, 4: 7.52%, 5: 7.20%, 6: 6.78%, 7: 5.07%, 8: 3.79%, 9: 3.79%, 10: 3.84%, 11: 3.20%, 12: 3.79%, 13: 3.09%, 14: 3.15%, 15: 2.08%, 16: 1.76%, 17: 2.03%, 18: 1.92%, 19: 1.97%, 20: 0.85%, 21: 0.85%, 22: 1.01%, 23: 0.64%, 24: 0.75%, 25: 0.80%, 26: 0.59%, 27: 0.59%, 28: 0.69%, 29: 0.64%, 30: 0.43%, 31: 0.32%, 32: 0.59%, 33: 1.33%, 34: 1.12%, 35: 2.67%, 36: 0.80%, 37: 0.27%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2680Response: | Success: | Total:
2681OK: | 155 ( 8.27%) | 407 ( 6.29%)
2682NXDOMAIN: | 1630 ( 86.98%) | 4096 ( 63.32%)
2683SERVFAIL: | 89 ( 4.75%) | 213 ( 3.29%)
2684REFUSED: | 0 ( 0.00%) | 1753 ( 27.10%)
2685FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2686
2687
2688
2689Processed queries: 1919
2690Received packets: 6867
2691Progress: 100.00% (00 h 00 min 19 sec / 00 h 00 min 19 sec)
2692Current incoming rate: 353 pps, average: 360 pps
2693Current success rate: 36 pps, average: 100 pps
2694Finished total: 1911, success: 1911 (100.00%)
2695Mismatched domains: 4255 (62.42%), IDs: 0 (0.00%)
2696Failures: 0: 4.19%, 1: 7.06%, 2: 7.38%, 3: 7.33%, 4: 7.38%, 5: 7.06%, 6: 6.65%, 7: 4.97%, 8: 3.72%, 9: 3.72%, 10: 3.77%, 11: 3.14%, 12: 3.72%, 13: 3.04%, 14: 3.09%, 15: 2.04%, 16: 1.73%, 17: 1.99%, 18: 1.88%, 19: 1.94%, 20: 0.84%, 21: 0.84%, 22: 0.99%, 23: 0.63%, 24: 0.73%, 25: 0.78%, 26: 0.58%, 27: 0.58%, 28: 0.68%, 29: 0.63%, 30: 0.42%, 31: 0.31%, 32: 0.58%, 33: 1.31%, 34: 1.10%, 35: 1.20%, 36: 0.89%, 37: 1.10%, 38: 0.26%, 39: 0.16%, 40: 0.05%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2697Response: | Success: | Total:
2698OK: | 158 ( 8.27%) | 429 ( 6.29%)
2699NXDOMAIN: | 1660 ( 86.87%) | 4302 ( 63.11%)
2700SERVFAIL: | 93 ( 4.87%) | 224 ( 3.29%)
2701REFUSED: | 0 ( 0.00%) | 1861 ( 27.30%)
2702FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2703
2704
2705
2706Processed queries: 1919
2707Received packets: 7234
2708Progress: 100.00% (00 h 00 min 20 sec / 00 h 00 min 20 sec)
2709Current incoming rate: 366 pps, average: 360 pps
2710Current success rate: 4 pps, average: 95 pps
2711Finished total: 1916, success: 1916 (100.00%)
2712Mismatched domains: 4617 (64.27%), IDs: 0 (0.00%)
2713Failures: 0: 4.18%, 1: 7.05%, 2: 7.36%, 3: 7.31%, 4: 7.36%, 5: 7.05%, 6: 6.63%, 7: 4.96%, 8: 3.71%, 9: 3.71%, 10: 3.76%, 11: 3.13%, 12: 3.71%, 13: 3.03%, 14: 3.08%, 15: 2.04%, 16: 1.72%, 17: 1.98%, 18: 1.88%, 19: 1.93%, 20: 0.84%, 21: 0.84%, 22: 0.99%, 23: 0.63%, 24: 0.73%, 25: 0.78%, 26: 0.57%, 27: 0.57%, 28: 0.68%, 29: 0.63%, 30: 0.42%, 31: 0.31%, 32: 0.57%, 33: 1.30%, 34: 1.10%, 35: 1.20%, 36: 0.89%, 37: 0.94%, 38: 0.26%, 39: 0.31%, 40: 0.00%, 41: 0.00%, 42: 0.05%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2714Response: | Success: | Total:
2715OK: | 160 ( 8.35%) | 451 ( 6.28%)
2716NXDOMAIN: | 1663 ( 86.80%) | 4528 ( 63.03%)
2717SERVFAIL: | 93 ( 4.85%) | 235 ( 3.27%)
2718REFUSED: | 0 ( 0.00%) | 1969 ( 27.41%)
2719FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2720
2721
2722
2723Processed queries: 1919
2724Received packets: 7593
2725Progress: 100.00% (00 h 00 min 21 sec / 00 h 00 min 21 sec)
2726Current incoming rate: 358 pps, average: 360 pps
2727Current success rate: 1 pps, average: 91 pps
2728Finished total: 1918, success: 1918 (100.00%)
2729Mismatched domains: 4966 (65.91%), IDs: 0 (0.00%)
2730Failures: 0: 4.17%, 1: 7.04%, 2: 7.35%, 3: 7.30%, 4: 7.35%, 5: 7.04%, 6: 6.62%, 7: 4.95%, 8: 3.70%, 9: 3.70%, 10: 3.75%, 11: 3.13%, 12: 3.70%, 13: 3.02%, 14: 3.08%, 15: 2.03%, 16: 1.72%, 17: 1.98%, 18: 1.88%, 19: 1.93%, 20: 0.83%, 21: 0.83%, 22: 0.99%, 23: 0.63%, 24: 0.73%, 25: 0.78%, 26: 0.57%, 27: 0.57%, 28: 0.68%, 29: 0.63%, 30: 0.42%, 31: 0.31%, 32: 0.57%, 33: 1.30%, 34: 1.09%, 35: 1.20%, 36: 0.89%, 37: 0.94%, 38: 0.26%, 39: 0.21%, 40: 0.05%, 41: 0.05%, 42: 0.05%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2731Response: | Success: | Total:
2732OK: | 160 ( 8.34%) | 462 ( 6.13%)
2733NXDOMAIN: | 1665 ( 86.81%) | 4756 ( 63.12%)
2734SERVFAIL: | 93 ( 4.85%) | 244 ( 3.24%)
2735REFUSED: | 0 ( 0.00%) | 2072 ( 27.50%)
2736FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2737
2738
2739
2740Processed queries: 1919
2741Received packets: 7948
2742Progress: 100.00% (00 h 00 min 22 sec / 00 h 00 min 22 sec)
2743Current incoming rate: 354 pps, average: 360 pps
2744Current success rate: 0 pps, average: 87 pps
2745Finished total: 1918, success: 1918 (100.00%)
2746Mismatched domains: 5317 (67.42%), IDs: 0 (0.00%)
2747Failures: 0: 4.17%, 1: 7.04%, 2: 7.35%, 3: 7.30%, 4: 7.35%, 5: 7.04%, 6: 6.62%, 7: 4.95%, 8: 3.70%, 9: 3.70%, 10: 3.75%, 11: 3.13%, 12: 3.70%, 13: 3.02%, 14: 3.08%, 15: 2.03%, 16: 1.72%, 17: 1.98%, 18: 1.88%, 19: 1.93%, 20: 0.83%, 21: 0.83%, 22: 0.99%, 23: 0.63%, 24: 0.73%, 25: 0.78%, 26: 0.57%, 27: 0.57%, 28: 0.68%, 29: 0.63%, 30: 0.42%, 31: 0.31%, 32: 0.57%, 33: 1.30%, 34: 1.09%, 35: 1.20%, 36: 0.89%, 37: 0.94%, 38: 0.26%, 39: 0.21%, 40: 0.05%, 41: 0.00%, 42: 0.05%, 43: 0.05%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2748Response: | Success: | Total:
2749OK: | 160 ( 8.34%) | 484 ( 6.14%)
2750NXDOMAIN: | 1665 ( 86.81%) | 4968 ( 63.00%)
2751SERVFAIL: | 93 ( 4.85%) | 256 ( 3.25%)
2752REFUSED: | 0 ( 0.00%) | 2176 ( 27.59%)
2753FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2754
2755
2756
2757Processed queries: 1919
2758Received packets: 8275
2759Progress: 100.00% (00 h 00 min 23 sec / 00 h 00 min 23 sec)
2760Current incoming rate: 326 pps, average: 359 pps
2761Current success rate: 0 pps, average: 83 pps
2762Finished total: 1918, success: 1918 (100.00%)
2763Mismatched domains: 5644 (68.72%), IDs: 0 (0.00%)
2764Failures: 0: 4.17%, 1: 7.04%, 2: 7.35%, 3: 7.30%, 4: 7.35%, 5: 7.04%, 6: 6.62%, 7: 4.95%, 8: 3.70%, 9: 3.70%, 10: 3.75%, 11: 3.13%, 12: 3.70%, 13: 3.02%, 14: 3.08%, 15: 2.03%, 16: 1.72%, 17: 1.98%, 18: 1.88%, 19: 1.93%, 20: 0.83%, 21: 0.83%, 22: 0.99%, 23: 0.63%, 24: 0.73%, 25: 0.78%, 26: 0.57%, 27: 0.57%, 28: 0.68%, 29: 0.63%, 30: 0.42%, 31: 0.31%, 32: 0.57%, 33: 1.30%, 34: 1.09%, 35: 1.20%, 36: 0.89%, 37: 0.94%, 38: 0.26%, 39: 0.21%, 40: 0.05%, 41: 0.00%, 42: 0.05%, 43: 0.00%, 44: 0.00%, 45: 0.05%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2765Response: | Success: | Total:
2766OK: | 160 ( 8.34%) | 495 ( 6.03%)
2767NXDOMAIN: | 1665 ( 86.81%) | 5194 ( 63.24%)
2768SERVFAIL: | 93 ( 4.85%) | 262 ( 3.19%)
2769REFUSED: | 0 ( 0.00%) | 2258 ( 27.49%)
2770FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2771
2772
2773
2774Processed queries: 1919
2775Received packets: 8290
2776Progress: 100.00% (00 h 00 min 24 sec / 00 h 00 min 24 sec)
2777Current incoming rate: 14 pps, average: 344 pps
2778Current success rate: 0 pps, average: 79 pps
2779Finished total: 1918, success: 1918 (100.00%)
2780Mismatched domains: 5659 (68.78%), IDs: 0 (0.00%)
2781Failures: 0: 4.17%, 1: 7.04%, 2: 7.35%, 3: 7.30%, 4: 7.35%, 5: 7.04%, 6: 6.62%, 7: 4.95%, 8: 3.70%, 9: 3.70%, 10: 3.75%, 11: 3.13%, 12: 3.70%, 13: 3.02%, 14: 3.08%, 15: 2.03%, 16: 1.72%, 17: 1.98%, 18: 1.88%, 19: 1.93%, 20: 0.83%, 21: 0.83%, 22: 0.99%, 23: 0.63%, 24: 0.73%, 25: 0.78%, 26: 0.57%, 27: 0.57%, 28: 0.68%, 29: 0.63%, 30: 0.42%, 31: 0.31%, 32: 0.57%, 33: 1.30%, 34: 1.09%, 35: 1.20%, 36: 0.89%, 37: 0.94%, 38: 0.26%, 39: 0.21%, 40: 0.05%, 41: 0.00%, 42: 0.05%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.05%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2782Response: | Success: | Total:
2783OK: | 160 ( 8.34%) | 495 ( 6.02%)
2784NXDOMAIN: | 1665 ( 86.81%) | 5206 ( 63.27%)
2785SERVFAIL: | 93 ( 4.85%) | 263 ( 3.20%)
2786REFUSED: | 0 ( 0.00%) | 2260 ( 27.47%)
2787FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2788
2789
2790
2791Processed queries: 1919
2792Received packets: 8295
2793Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
2794Current incoming rate: 4 pps, average: 331 pps
2795Current success rate: 0 pps, average: 76 pps
2796Finished total: 1918, success: 1918 (100.00%)
2797Mismatched domains: 5664 (68.80%), IDs: 0 (0.00%)
2798Failures: 0: 4.17%, 1: 7.04%, 2: 7.35%, 3: 7.30%, 4: 7.35%, 5: 7.04%, 6: 6.62%, 7: 4.95%, 8: 3.70%, 9: 3.70%, 10: 3.75%, 11: 3.13%, 12: 3.70%, 13: 3.02%, 14: 3.08%, 15: 2.03%, 16: 1.72%, 17: 1.98%, 18: 1.88%, 19: 1.93%, 20: 0.83%, 21: 0.83%, 22: 0.99%, 23: 0.63%, 24: 0.73%, 25: 0.78%, 26: 0.57%, 27: 0.57%, 28: 0.68%, 29: 0.63%, 30: 0.42%, 31: 0.31%, 32: 0.57%, 33: 1.30%, 34: 1.09%, 35: 1.20%, 36: 0.89%, 37: 0.94%, 38: 0.26%, 39: 0.21%, 40: 0.05%, 41: 0.00%, 42: 0.05%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.05%, 50: 0.00%,
2799Response: | Success: | Total:
2800OK: | 160 ( 8.34%) | 495 ( 6.01%)
2801NXDOMAIN: | 1665 ( 86.81%) | 5208 ( 63.26%)
2802SERVFAIL: | 93 ( 4.85%) | 264 ( 3.21%)
2803REFUSED: | 0 ( 0.00%) | 2262 ( 27.47%)
2804FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2805
2806
2807
2808Processed queries: 1919
2809Received packets: 8295
2810Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
2811Current incoming rate: 0 pps, average: 330 pps
2812Current success rate: 0 pps, average: 76 pps
2813Finished total: 1919, success: 1918 (99.95%)
2814Mismatched domains: 5664 (68.80%), IDs: 0 (0.00%)
2815Failures: 0: 4.17%, 1: 7.03%, 2: 7.35%, 3: 7.30%, 4: 7.35%, 5: 7.03%, 6: 6.62%, 7: 4.95%, 8: 3.70%, 9: 3.70%, 10: 3.75%, 11: 3.13%, 12: 3.70%, 13: 3.02%, 14: 3.07%, 15: 2.03%, 16: 1.72%, 17: 1.98%, 18: 1.88%, 19: 1.93%, 20: 0.83%, 21: 0.83%, 22: 0.99%, 23: 0.63%, 24: 0.73%, 25: 0.78%, 26: 0.57%, 27: 0.57%, 28: 0.68%, 29: 0.63%, 30: 0.42%, 31: 0.31%, 32: 0.57%, 33: 1.30%, 34: 1.09%, 35: 1.20%, 36: 0.89%, 37: 0.94%, 38: 0.26%, 39: 0.21%, 40: 0.05%, 41: 0.00%, 42: 0.05%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.05%,
2816Response: | Success: | Total:
2817OK: | 160 ( 8.34%) | 495 ( 6.01%)
2818NXDOMAIN: | 1665 ( 86.81%) | 5208 ( 63.26%)
2819SERVFAIL: | 93 ( 4.85%) | 264 ( 3.21%)
2820REFUSED: | 0 ( 0.00%) | 2262 ( 27.47%)
2821FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2822www.citizensforthestcroixvalley.com
2823citizensforthestcroixvalley.com.
2824######################################################################################################################################
2825[*] Found SPF record:
2826[*] v=spf1 include:spf.protection.outlook.com -all
2827[*] SPF record contains an All item: -all
2828[*] No DMARC record found. Looking for organizational record
2829[+] No organizational DMARC record
2830[+] Spoofing possible for www.citizensforthestcroixvalley.com!
2831#####################################################################################################################################
2832Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 18:42 EDT
2833Nmap scan report for www.citizensforthestcroixvalley.com (160.153.136.3)
2834Host is up (0.14s latency).
2835rDNS record for 160.153.136.3: ip-160-153-136-3.ip.secureserver.net
2836Not shown: 995 filtered ports, 3 closed ports
2837Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2838PORT STATE SERVICE
283980/tcp open http
2840443/tcp open https
2841
2842Nmap done: 1 IP address (1 host up) scanned in 13.39 seconds
2843#####################################################################################################################################
2844Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 18:43 EDT
2845Nmap scan report for www.citizensforthestcroixvalley.com (160.153.136.3)
2846Host is up (0.23s latency).
2847rDNS record for 160.153.136.3: ip-160-153-136-3.ip.secureserver.net
2848Not shown: 2 filtered ports
2849PORT STATE SERVICE
285053/udp open|filtered domain
285167/udp open|filtered dhcps
285268/udp open|filtered dhcpc
285369/udp open|filtered tftp
285488/udp open|filtered kerberos-sec
2855123/udp open|filtered ntp
2856139/udp open|filtered netbios-ssn
2857161/udp open|filtered snmp
2858162/udp open|filtered snmptrap
2859389/udp open|filtered ldap
2860500/udp open|filtered isakmp
2861520/udp open|filtered route
28622049/udp open|filtered nfs
2863
2864Nmap done: 1 IP address (1 host up) scanned in 5.12 seconds
2865######################################################################################################################################
2866HTTP/1.1 301 Moved Permanently
2867location: https://www.citizensforthestcroixvalley.com/
2868Vary: Accept-Encoding
2869Server: DPS/1.6.13
2870X-SiteId: 4000
2871Set-Cookie: dps_site_id=4000; path=/
2872Date: Thu, 24 Oct 2019 22:43:21 GMT
2873Connection: keep-alive
2874#####################################################################################################################################
2875http://www.citizensforthestcroixvalley.com [301 Moved Permanently] Cookies[dps_site_id], Country[UNITED STATES][US], HTTPServer[DPS/1.6.13], IP[160.153.136.3], RedirectLocation[https://www.citizensforthestcroixvalley.com/], UncommonHeaders[x-siteid], WebsiteTonight
2876https://www.citizensforthestcroixvalley.com/ [200 OK] Cookies[dps_site_id], Country[UNITED STATES][US], Frame, HTML5, HTTPServer[DPS/1.6.13], IP[160.153.136.3], MetaGenerator[Starfield Technologies; Go Daddy Website Builder 7.0.5350], Open-Graph-Protocol[website], Script[text/javascript], Title[Citizens for the St. Croix Valley], UncommonHeaders[link,content-security-policy,x-siteid], WebsiteTonight, X-UA-Compatible[IE=edge]
2877#####################################################################################################################################
2878Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 18:45 EDT
2879NSE: Loaded 163 scripts for scanning.
2880NSE: Script Pre-scanning.
2881Initiating NSE at 18:45
2882Completed NSE at 18:45, 0.00s elapsed
2883Initiating NSE at 18:45
2884Completed NSE at 18:45, 0.00s elapsed
2885Initiating Parallel DNS resolution of 1 host. at 18:45
2886Completed Parallel DNS resolution of 1 host. at 18:45, 0.02s elapsed
2887Initiating SYN Stealth Scan at 18:45
2888Scanning www.citizensforthestcroixvalley.com (160.153.136.3) [1 port]
2889Discovered open port 80/tcp on 160.153.136.3
2890Completed SYN Stealth Scan at 18:45, 0.17s elapsed (1 total ports)
2891Initiating Service scan at 18:45
2892Scanning 1 service on www.citizensforthestcroixvalley.com (160.153.136.3)
2893Completed Service scan at 18:45, 6.35s elapsed (1 service on 1 host)
2894Initiating OS detection (try #1) against www.citizensforthestcroixvalley.com (160.153.136.3)
2895Retrying OS detection (try #2) against www.citizensforthestcroixvalley.com (160.153.136.3)
2896Initiating Traceroute at 18:45
2897Completed Traceroute at 18:45, 3.22s elapsed
2898Initiating Parallel DNS resolution of 10 hosts. at 18:45
2899Completed Parallel DNS resolution of 10 hosts. at 18:45, 0.38s elapsed
2900NSE: Script scanning 160.153.136.3.
2901Initiating NSE at 18:45
2902Completed NSE at 18:47, 115.18s elapsed
2903Initiating NSE at 18:47
2904Completed NSE at 18:47, 2.29s elapsed
2905Nmap scan report for www.citizensforthestcroixvalley.com (160.153.136.3)
2906Host is up (0.19s latency).
2907rDNS record for 160.153.136.3: ip-160-153-136-3.ip.secureserver.net
2908
2909PORT STATE SERVICE VERSION
291080/tcp open http Samsung AllShare httpd
2911| http-brute:
2912|_ Path "/" does not require authentication
2913|_http-chrono: Request times for /; avg: 1253.37ms; min: 649.16ms; max: 2419.15ms
2914|_http-csrf: Couldn't find any CSRF vulnerabilities.
2915|_http-date: Thu, 24 Oct 2019 22:45:34 GMT; 0s from local time.
2916|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2917|_http-dombased-xss: Couldn't find any DOM based XSS.
2918|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2919|_http-errors: Couldn't find any error pages.
2920|_http-feed: Couldn't find any feeds.
2921|_http-fetch: Please enter the complete path of the directory to save data in.
2922| http-headers:
2923| location: https://www.citizensforthestcroixvalley.com/
2924| Vary: Accept-Encoding
2925| Server: DPS/1.6.13
2926| X-SiteId: 4000
2927| Set-Cookie: dps_site_id=4000; path=/
2928| ETag: cf9d0bc403007a25332707e4faff7c69
2929| Date: Thu, 24 Oct 2019 22:45:40 GMT
2930| Connection: close
2931| Transfer-Encoding: chunked
2932|
2933|_ (Request type: GET)
2934|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2935| http-methods:
2936|_ Supported Methods: GET HEAD POST OPTIONS
2937|_http-mobileversion-checker: No mobile version detected.
2938|_http-passwd: ERROR: Script execution failed (use -d to debug)
2939|_http-security-headers:
2940|_http-server-header: DPS/1.6.13
2941| http-sitemap-generator:
2942| Directory structure:
2943| Longest directory structure:
2944| Depth: 0
2945| Dir: /
2946| Total files found (by extension):
2947|_
2948|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2949|_http-title: Did not follow redirect to https://www.citizensforthestcroixvalley.com/
2950|_http-traceroute: ERROR: Script execution failed (use -d to debug)
2951| http-vhosts:
2952| ads.citizensforthestcroixvalley.com
2953| ns0.citizensforthestcroixvalley.com
2954| id.citizensforthestcroixvalley.com
2955| ns3.citizensforthestcroixvalley.com
2956| internal.citizensforthestcroixvalley.com
2957| log.citizensforthestcroixvalley.com
2958| www.citizensforthestcroixvalley.com : 301 -> https://www.citizensforthestcroixvalley.com/
2959|_120 names had status 404
2960|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
2961|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2962|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2963|_http-xssed: No previously reported XSS vuln.
2964| vulscan: VulDB - https://vuldb.com:
2965| [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
2966| [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
2967| [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
2968| [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
2969| [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
2970| [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
2971| [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
2972| [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
2973| [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
2974| [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
2975| [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
2976| [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
2977| [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
2978| [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
2979| [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
2980| [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
2981| [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
2982| [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
2983| [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
2984| [124425] Samsung Members Intent privilege escalation
2985| [124418] Samsung Internet Browser Object privilege escalation
2986| [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
2987| [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
2988| [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
2989| [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
2990| [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
2991| [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
2992| [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
2993| [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
2994| [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
2995| [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
2996| [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
2997| [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
2998| [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
2999| [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
3000| [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
3001| [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3002| [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
3003| [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
3004| [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
3005| [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
3006| [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
3007| [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3008| [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
3009| [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
3010| [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3011| [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3012| [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3013| [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
3014| [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
3015| [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
3016| [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
3017| [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
3018| [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
3019| [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3020| [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
3021| [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
3022| [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
3023| [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
3024| [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
3025| [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
3026| [115288] Samsung Mobile Device N(7.x) APK privilege escalation
3027| [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
3028| [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
3029| [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
3030| [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
3031| [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
3032| [112195] Samsung Gear Bluetooth weak authentication
3033| [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
3034| [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
3035| [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
3036| [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
3037| [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
3038| [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
3039| [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
3040| [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
3041| [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
3042| [102728] Samsung Magician 5.0 TLS Certificate weak encryption
3043| [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
3044| [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
3045| [99817] Samsung Galaxy S6 SecEmailSync sql injection
3046| [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
3047| [98938] Samsung Account up to 1.6/2.1 weak encryption
3048| [98937] Samsung GALAXY Apps weak encryption
3049| [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
3050| [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
3051| [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
3052| [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
3053| [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
3054| [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
3055| [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
3056| [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
3057| [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
3058| [94604] Samsung DVR Web Viewer Cookie weak encryption
3059| [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
3060| [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
3061| [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
3062| [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
3063| [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
3064| [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
3065| [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
3066| [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
3067| [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
3068| [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
3069| [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
3070| [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
3071| [80263] Samsung SRN-1670D Web Viewer File information disclosure
3072| [79057] Samsung Galaxy S6 JPEG Image memory corruption
3073| [79056] Samsung Galaxy S6 GIF Image Crash denial of service
3074| [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
3075| [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
3076| [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
3077| [76316] Samsung SBeam 15000 NFC Connection information disclosure
3078| [76087] Samsung Galaxy S5 createFromParcel memory corruption
3079| [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
3080| [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
3081| [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
3082| [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
3083| [74213] Samsung Samsung Security Manager up to 1.29 denial of service
3084| [73144] Samsung SmartViewer ActiveX Control memory corruption
3085| [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
3086| [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
3087| [68531] Samsung Mobile Devices Remote Control Feature denial of service
3088| [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
3089| [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
3090| [12842] Samsung TV D7000 SSID Authentication weak authentication
3091| [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
3092| [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
3093| [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
3094| [64793] Samsung Smart Viewer unknown vulnerability
3095| [64792] Samsung Smart Viewer Web View Cleartext information disclosure
3096| [9717] Samsung PS50C7700 HTTP Request denial of service
3097| [9148] Samsung IP Camera URL Validator cross site scripting
3098| [7892] Samsung UE55ES6800 SOAPACTION denial of service
3099| [63280] Samsung SamsungDive Subsystem unknown vulnerability
3100| [63277] Samsung SamsungDive Subsystem spoofing
3101| [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
3102| [7168] Samsung LED 3D Smart TV memory corruption
3103| [63139] Samsung Kies Air 2.1.210161 Crash denial of service
3104| [63138] Samsung Kies Air 2.1.210161 spoofing
3105| [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
3106| [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
3107| [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
3108| [61634] Samsung NET-i viewer 1.37.120316 denial of service
3109| [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
3110| [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
3111| [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
3112| [60919] Samsung Chromebox 3 unknown vulnerability
3113| [5259] Samsung TV MAC Address memory corruption
3114| [5258] Samsung TV Controller Packet denial of service
3115| [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
3116| [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
3117|
3118| MITRE CVE - https://cve.mitre.org:
3119| [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
3120| [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
3121| [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
3122| [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
3123| [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
3124| [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
3125| [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
3126| [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
3127| [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
3128| [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
3129| [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
3130| [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
3131| [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
3132| [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
3133| [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
3134| [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
3135| [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
3136| [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
3137| [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
3138| [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3139| [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3140| [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3141| [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3142| [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3143| [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3144| [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
3145| [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
3146| [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
3147| [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
3148| [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
3149| [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
3150| [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
3151| [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
3152|
3153| SecurityFocus - https://www.securityfocus.com/bid/:
3154| [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
3155| [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
3156| [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
3157| [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
3158| [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
3159| [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
3160| [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
3161| [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
3162| [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
3163| [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
3164| [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
3165| [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
3166| [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
3167| [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
3168| [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
3169| [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
3170| [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
3171| [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
3172| [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
3173| [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
3174| [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
3175| [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
3176| [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
3177| [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
3178| [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
3179| [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
3180| [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
3181| [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
3182| [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
3183| [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
3184| [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
3185| [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
3186| [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
3187| [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
3188| [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
3189| [84287] Samsung SW Update Tool Security Bypass Vulnerability
3190| [84284] Samsung SW Update Tool Information Disclosure Vulnerability
3191| [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
3192| [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
3193| [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
3194| [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
3195| [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
3196| [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
3197| [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
3198| [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
3199| [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
3200| [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
3201| [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
3202| [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
3203| [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
3204| [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
3205| [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
3206| [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
3207| [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
3208| [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
3209| [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
3210| [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
3211| [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
3212| [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
3213| [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
3214| [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
3215| [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
3216| [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
3217| [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
3218| [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
3219| [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
3220| [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
3221| [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
3222| [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
3223| [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
3224| [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
3225| [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
3226| [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
3227| [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
3228| [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
3229| [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
3230| [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
3231| [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
3232| [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
3233| [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
3234| [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
3235| [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
3236| [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
3237| [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
3238| [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
3239| [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
3240| [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
3241| [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
3242| [55936] Samsung Kies Multiple Security Vulnerabilities
3243| [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
3244| [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
3245| [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
3246| [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
3247| [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
3248| [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
3249| [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
3250| [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
3251| [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
3252| [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
3253| [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
3254| [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
3255| [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
3256| [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
3257|
3258| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3259| [85904] Samsung PS50C7700 TV denial of service
3260| [85190] Samsung Galaxy S4 spoofing
3261| [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
3262| [82662] Samsung TV SOAPACTION denial of service
3263| [82602] Samsung Galaxy S III Lock Screen security bypass
3264| [82352] Samsung Galaxy S III Passcode Lock security bypass
3265| [80926] Samsung Galaxy security bypass
3266| [80923] Samsung Galaxy SamsungDive information disclosure
3267| [80886] Samsung SmartPhones privilege escalation
3268| [80709] Samsung Galaxy S2 kernel privilege escalation
3269| [80336] Samsung printers backdoor
3270| [80092] Samsung Kies Air security bypass
3271| [80091] Samsung Kies Air GET denial of service
3272| [79445] Samsung Kies ActiveX Control registry key security bypass
3273| [79443] Samsung Kies ActiveX Control security bypass
3274| [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
3275| [79283] Samsung Kies ActiveX CmdAgent.dll code execution
3276| [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
3277| [79193] Samsung Galaxy S III sandbox privilege escalation
3278| [79192] Samsung Galaxy S III document viewer code execution
3279| [78904] Samsung Galaxy S III USSD denial of service
3280| [77811] Samsung Galaxy S2 Epic 4G Touch symlink
3281| [76396] AllShare libpin3_dll.dll denial of service
3282| [75310] Samsung NET-i viewer ActiveX control buffer overflow
3283| [75070] Samsung NET-i ware ActiveX control buffer overflow
3284| [75069] Samsung NET-i ware ActiveX control code execution
3285| [75066] Samsung NET-i ware Master and Storage denial of service
3286| [74928] Multiple Samsung TV and BD products string denial of service
3287| [74927] Multiple Samsung TV and BD products controller packet denial of service
3288| [71316] Samsung Omnia 7 RapiConfig.exe code execution
3289| [67315] Samsung Integrated Management System DMS authentication form SQL Injection
3290| [50110] Samsung SMS messages authentication bypass
3291| [44995] Samsung DVR SHR2040 Web interface denial of service
3292| [35502] Samsung SCX-4200 driver installation script privilege escalation
3293| [19927] Samsung default accounts and passwords allow unauthorized access
3294| [19925] Samsung ADSL Router information disclosure
3295| [15973] Samsung SmartEther allows administrative access
3296| [6845] Samsung ML-85G printer driver /tmp symlink
3297|
3298| Exploit-DB - https://www.exploit-db.com:
3299| [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
3300| [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
3301| [27043] Samsung PS50C7700 TV - Denial of Service
3302| [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
3303| [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
3304| [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
3305| [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
3306| [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
3307| [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
3308| [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
3309| [18751] Samsung D6000 TV Multiple Vulnerabilities
3310| [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
3311|
3312| OpenVAS (Nessus) - http://www.openvas.org:
3313| [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
3314|
3315| SecurityTracker - https://www.securitytracker.com:
3316| [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
3317| [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
3318| [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
3319| [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
3320| [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
3321| [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
3322| [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
3323| [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
3324| [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
3325|
3326| OSVDB - http://www.osvdb.org:
3327| [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
3328| [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
3329| [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
3330| [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
3331| [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
3332| [94223] Samsung Multiple IP Camera URI XSS
3333| [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
3334| [91498] Google Android on Samsung Multiple Unspecified DoS
3335| [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
3336| [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
3337| [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
3338| [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
3339| [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
3340| [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
3341| [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
3342| [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
3343| [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
3344| [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
3345| [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
3346| [88379] Samsung LED 3D TV Unspecified Remote Command Execution
3347| [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
3348| [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
3349| [87872] Samsung Multiple Printers Hardcoded Admin Credentials
3350| [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
3351| [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
3352| [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
3353| [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
3354| [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
3355| [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
3356| [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
3357| [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
3358| [79398] Samsung DWCD Web Interface Default Password (Femtocell)
3359| [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
3360| [72255] Samsung Data Management Server Default Hardcoded root Password
3361| [72227] Samsung Data Management Server Unspecified SQL Injection
3362| [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
3363| [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
3364| [54690] Samsung G3210 Web Interface Default Password
3365| [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
3366| [54688] Samsung G3210 FTP-Server Default Credentials
3367| [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
3368| [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
3369| [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
3370| [16684] Samsung SmartEther Long Password Forced Authentication
3371| [15023] Samsung ADSL Modem Multiple Default Accounts
3372| [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
3373|_
3374Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3375OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
3376No OS matches for host
3377Uptime guess: 0.004 days (since Thu Oct 24 18:41:14 2019)
3378Network Distance: 15 hops
3379TCP Sequence Prediction: Difficulty=258 (Good luck!)
3380IP ID Sequence Generation: All zeros
3381
3382TRACEROUTE (using port 80/tcp)
3383HOP RTT ADDRESS
33841 203.74 ms 10.245.204.1
33852 650.24 ms 45.131.4.2
33863 203.81 ms 109.236.95.230
33874 203.83 ms be4381.rcr21.rtm01.atlas.cogentco.com (149.6.110.89)
33885 203.86 ms be3433.ccr41.ams03.atlas.cogentco.com (154.54.58.201)
33896 203.92 ms ae-6.edge7.Amsterdam1.Level3.net (4.68.37.101)
33907 ...
33918 203.91 ms THE-GO-DADD.ear3.Amsterdam1.Level3.net (213.19.197.58)
33929 203.95 ms ae2.bbsa0106-01.ams3.bb.godaddy.com (188.121.32.5)
339310 102.44 ms 188.121.32.115
339411 ... 14
339515 336.78 ms ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
3396
3397NSE: Script Post-scanning.
3398Initiating NSE at 18:47
3399Completed NSE at 18:47, 0.00s elapsed
3400Initiating NSE at 18:47
3401Completed NSE at 18:47, 0.00s elapsed
3402#####################################################################################################################################
3403HTTP/2 404
3404content-type: text/html;charset=utf-8
3405content-length: 964
3406vary: Accept-Encoding
3407server: DPS/1.6.13
3408x-siteid: 4000
3409set-cookie: dps_site_id=4000; path=/; secure
3410date: Thu, 24 Oct 2019 22:48:14 GMT
3411####################################################################################################################################
3412https://www.citizensforthestcroixvalley.com [200 OK] Cookies[dps_site_id], Country[UNITED STATES][US], Frame, HTML5, HTTPServer[DPS/1.6.13], IP[160.153.136.3], MetaGenerator[Starfield Technologies; Go Daddy Website Builder 7.0.5350], Open-Graph-Protocol[website], Script[text/javascript], Title[Citizens for the St. Croix Valley], UncommonHeaders[link,content-security-policy,x-siteid], WebsiteTonight, X-UA-Compatible[IE=edge]
3413######################################################################################################################################
3414wig - WebApp Information Gatherer
3415
3416
3417Scanning https://www.citizensforthestcroixvalley.com...
3418_________________ SITE INFO _________________
3419IP Title
3420160.153.136.3 Citizens for the St. Croix V
3421
3422__________________ VERSION __________________
3423Name Versions Type
3424dps 1.6.13 Platform
3425
3426_____________________________________________
3427Time: 1.7 sec Urls: 600 Fingerprints: 40401
3428
3429####################################################################################################################################
3430Version: 1.11.13-static
3431OpenSSL 1.0.2-chacha (1.0.2g-dev)
3432
3433Connected to 160.153.136.3
3434
3435Testing SSL server www.citizensforthestcroixvalley.com on port 443 using SNI name www.citizensforthestcroixvalley.com
3436
3437 TLS Fallback SCSV:
3438Server supports TLS Fallback SCSV
3439
3440 TLS renegotiation:
3441Session renegotiation not supported
3442
3443 TLS Compression:
3444Compression disabled
3445
3446 Heartbleed:
3447TLS 1.2 not vulnerable to heartbleed
3448TLS 1.1 not vulnerable to heartbleed
3449TLS 1.0 not vulnerable to heartbleed
3450
3451 Supported Server Cipher(s):
3452Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
3453Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
3454Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
3455Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
3456Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3457Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3458Accepted TLSv1.2 128 bits AES128-GCM-SHA256
3459Accepted TLSv1.2 256 bits AES256-GCM-SHA384
3460Accepted TLSv1.2 128 bits AES128-SHA256
3461Accepted TLSv1.2 256 bits AES256-SHA256
3462Accepted TLSv1.2 128 bits AES128-SHA
3463Accepted TLSv1.2 256 bits AES256-SHA
3464
3465 SSL Certificate:
3466Signature Algorithm: sha256WithRSAEncryption
3467RSA Key Strength: 2048
3468
3469Subject: citizensforthestcroixvalley.com
3470Altnames: DNS:citizensforthestcroixvalley.com, DNS:www.citizensforthestcroixvalley.com
3471Issuer: Go Daddy Secure Certificate Authority - G2
3472
3473Not valid before: Mar 22 16:27:01 2018 GMT
3474Not valid after: Mar 22 16:27:01 2020 GMT
3475####################################################################################################################################
3476------------------------------------------------------------------------------------------------------------------------
3477
3478[ ! ] Starting SCANNER INURLBR 2.1 at [24-10-2019 18:50:30]
3479[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
3480It is the end user's responsibility to obey all applicable local, state and federal laws.
3481Developers assume no liability and are not responsible for any misuse or damage caused by this program
3482
3483[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.citizensforthestcroixvalley.com/output/inurlbr-www.citizensforthestcroixvalley.com ]
3484[ INFO ][ DORK ]::[ site:www.citizensforthestcroixvalley.com ]
3485[ INFO ][ SEARCHING ]:: {
3486[ INFO ][ ENGINE ]::[ GOOGLE - www.google.is ]
3487
3488[ INFO ][ SEARCHING ]::
3489-[:::]
3490[ INFO ][ ENGINE ]::[ GOOGLE API ]
3491
3492[ INFO ][ SEARCHING ]::
3493-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3494[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.lv ID: 012873187529719969291:yexdhbzntue ]
3495
3496[ INFO ][ SEARCHING ]::
3497-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3498
3499[ INFO ][ TOTAL FOUND VALUES ]:: [ 20 ]
3500
3501
3502 _[ - ]::--------------------------------------------------------------------------------------------------------------
3503|_[ + ] [ 0 / 20 ]-[18:50:51] [ - ]
3504|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/ ]
3505|_[ + ] Exploit::
3506|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3507|_[ + ] More details:: / - / , ISP:
3508|_[ + ] Found:: UNIDENTIFIED
3509
3510 _[ - ]::--------------------------------------------------------------------------------------------------------------
3511|_[ + ] [ 1 / 20 ]-[18:50:54] [ - ]
3512|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/home.html ]
3513|_[ + ] Exploit::
3514|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3515|_[ + ] More details:: / - / , ISP:
3516|_[ + ] Found:: UNIDENTIFIED
3517
3518 _[ - ]::--------------------------------------------------------------------------------------------------------------
3519|_[ + ] [ 2 / 20 ]-[18:50:56] [ - ]
3520|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/resources.html ]
3521|_[ + ] Exploit::
3522|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3523|_[ + ] More details:: / - / , ISP:
3524|_[ + ] Found:: UNIDENTIFIED
3525
3526 _[ - ]::--------------------------------------------------------------------------------------------------------------
3527|_[ + ] [ 3 / 20 ]-[18:50:59] [ - ]
3528|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/newsletter.html ]
3529|_[ + ] Exploit::
3530|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3531|_[ + ] More details:: / - / , ISP:
3532|_[ + ] Found:: UNIDENTIFIED
3533
3534 _[ - ]::--------------------------------------------------------------------------------------------------------------
3535|_[ + ] [ 4 / 20 ]-[18:51:01] [ - ]
3536|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/homeschooling.html ]
3537|_[ + ] Exploit::
3538|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3539|_[ + ] More details:: / - / , ISP:
3540|_[ + ] Found:: UNIDENTIFIED
3541
3542 _[ - ]::--------------------------------------------------------------------------------------------------------------
3543|_[ + ] [ 5 / 20 ]-[18:51:03] [ - ]
3544|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/what-can-you-do-.html ]
3545|_[ + ] Exploit::
3546|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3547|_[ + ] More details:: / - / , ISP:
3548|_[ + ] Found:: UNIDENTIFIED
3549
3550 _[ - ]::--------------------------------------------------------------------------------------------------------------
3551|_[ + ] [ 6 / 20 ]-[18:51:06] [ - ]
3552|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/media-inquiries.html ]
3553|_[ + ] Exploit::
3554|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3555|_[ + ] More details:: / - / , ISP:
3556|_[ + ] Found:: UNIDENTIFIED
3557
3558 _[ - ]::--------------------------------------------------------------------------------------------------------------
3559|_[ + ] [ 7 / 20 ]-[18:51:08] [ - ]
3560|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/about-contact-us.html ]
3561|_[ + ] Exploit::
3562|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3563|_[ + ] More details:: / - / , ISP:
3564|_[ + ] Found:: UNIDENTIFIED
3565
3566 _[ - ]::--------------------------------------------------------------------------------------------------------------
3567|_[ + ] [ 8 / 20 ]-[18:51:11] [ - ]
3568|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/refugee-resettlement-illegal-criminals.html ]
3569|_[ + ] Exploit::
3570|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3571|_[ + ] More details:: / - / , ISP:
3572|_[ + ] Found:: UNIDENTIFIED
3573
3574 _[ - ]::--------------------------------------------------------------------------------------------------------------
3575|_[ + ] [ 9 / 20 ]-[18:51:13] [ - ]
3576|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/truth-with-love-map.html ]
3577|_[ + ] Exploit::
3578|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3579|_[ + ] More details:: / - / , ISP:
3580|_[ + ] Found:: UNIDENTIFIED
3581
3582 _[ - ]::--------------------------------------------------------------------------------------------------------------
3583|_[ + ] [ 10 / 20 ]-[18:51:15] [ - ]
3584|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/same-sex-attraction-resources.html ]
3585|_[ + ] Exploit::
3586|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3587|_[ + ] More details:: / - / , ISP:
3588|_[ + ] Found:: UNIDENTIFIED
3589
3590 _[ - ]::--------------------------------------------------------------------------------------------------------------
3591|_[ + ] [ 11 / 20 ]-[18:51:18] [ - ]
3592|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/st.-croix-county-board.html ]
3593|_[ + ] Exploit::
3594|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3595|_[ + ] More details:: / - / , ISP:
3596|_[ + ] Found:: UNIDENTIFIED
3597
3598 _[ - ]::--------------------------------------------------------------------------------------------------------------
3599|_[ + ] [ 12 / 20 ]-[18:51:21] [ - ]
3600|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/st.-croix-county-mass-transit.html ]
3601|_[ + ] Exploit::
3602|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3603|_[ + ] More details:: / - / , ISP:
3604|_[ + ] Found:: UNIDENTIFIED
3605
3606 _[ - ]::--------------------------------------------------------------------------------------------------------------
3607|_[ + ] [ 13 / 20 ]-[18:51:23] [ - ]
3608|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/happening-in-minnesota--headed-our-way.html ]
3609|_[ + ] Exploit::
3610|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3611|_[ + ] More details:: / - / , ISP:
3612|_[ + ] Found:: UNIDENTIFIED
3613
3614 _[ - ]::--------------------------------------------------------------------------------------------------------------
3615|_[ + ] [ 14 / 20 ]-[18:51:25] [ - ]
3616|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/what-can-you-do---contact-area-pastors.html ]
3617|_[ + ] Exploit::
3618|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3619|_[ + ] More details:: / - / , ISP:
3620|_[ + ] Found:: UNIDENTIFIED
3621
3622 _[ - ]::--------------------------------------------------------------------------------------------------------------
3623|_[ + ] [ 15 / 20 ]-[18:51:27] [ - ]
3624|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/human-sex-trafficking-in-the-st.-croix-valley.html ]
3625|_[ + ] Exploit::
3626|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3627|_[ + ] More details:: / - / , ISP:
3628|_[ + ] Found:: UNIDENTIFIED
3629
3630 _[ - ]::--------------------------------------------------------------------------------------------------------------
3631|_[ + ] [ 16 / 20 ]-[18:51:30] [ - ]
3632|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/we-are-anti-islam--we-are-anti-sharia-.html ]
3633|_[ + ] Exploit::
3634|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3635|_[ + ] More details:: / - / , ISP:
3636|_[ + ] Found:: UNIDENTIFIED
3637
3638 _[ - ]::--------------------------------------------------------------------------------------------------------------
3639|_[ + ] [ 17 / 20 ]-[18:51:33] [ - ]
3640|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/st.-croix-valley-news--opinion-viewpoint-non-politically-correct.html ]
3641|_[ + ] Exploit::
3642|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3643|_[ + ] More details:: / - / , ISP:
3644|_[ + ] Found:: UNIDENTIFIED
3645
3646 _[ - ]::--------------------------------------------------------------------------------------------------------------
3647|_[ + ] [ 18 / 20 ]-[18:51:36] [ - ]
3648|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/archives---inclusion--resolution--establishment-clause--etc.-.html ]
3649|_[ + ] Exploit::
3650|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3651|_[ + ] More details:: / - / , ISP:
3652|_[ + ] Found:: UNIDENTIFIED
3653
3654 _[ - ]::--------------------------------------------------------------------------------------------------------------
3655|_[ + ] [ 19 / 20 ]-[18:51:38] [ - ]
3656|_[ + ] Target:: [ https://www.citizensforthestcroixvalley.com/southern-poverty-law-center--splc--and-the-death-of-free-speech-in-america.html ]
3657|_[ + ] Exploit::
3658|_[ + ] Information Server:: HTTP/2 200 , , IP:160.153.136.3:443
3659|_[ + ] More details:: / - / , ISP:
3660|_[ + ] Found:: UNIDENTIFIED
3661
3662[ INFO ] [ Shutting down ]
3663[ INFO ] [ End of process INURLBR at [24-10-2019 18:51:38]
3664[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3665[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.citizensforthestcroixvalley.com/output/inurlbr-www.citizensforthestcroixvalley.com ]
3666|_________________________________________________________________________________________
3667
3668\_________________________________________________________________________________________/
3669#####################################################################################################################################
3670Hosts
3671=====
3672
3673address mac name os_name os_flavor os_sp purpose info comments
3674------- --- ---- ------- --------- ----- ------- ---- --------
3675160.153.136.3 ip-160-153-136-3.ip.secureserver.net Unknown device
3676
3677Services
3678========
3679
3680host port proto name state info
3681---- ---- ----- ---- ----- ----
3682160.153.136.3 53 udp domain unknown
3683160.153.136.3 67 udp dhcps unknown
3684160.153.136.3 68 udp dhcpc unknown
3685160.153.136.3 69 udp tftp unknown
3686160.153.136.3 80 tcp http open
3687160.153.136.3 88 udp kerberos-sec unknown
3688160.153.136.3 123 udp ntp unknown
3689160.153.136.3 139 udp netbios-ssn unknown
3690160.153.136.3 161 udp snmp unknown
3691160.153.136.3 162 udp snmptrap unknown
3692160.153.136.3 389 udp ldap unknown
3693160.153.136.3 443 tcp https open
3694160.153.136.3 500 udp isakmp unknown
3695160.153.136.3 520 udp route unknown
3696160.153.136.3 2049 udp nfs unknown
3697#####################################################################################################################################
3698Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 18:09 EDT
3699Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
3700Host is up (0.15s latency).
3701Not shown: 995 filtered ports, 3 closed ports
3702Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3703PORT STATE SERVICE
370480/tcp open http
3705443/tcp open https
3706
3707Nmap done: 1 IP address (1 host up) scanned in 17.09 seconds
3708#####################################################################################################################################
3709map 7.80 ( https://nmap.org ) at 2019-10-24 18:09 EDT
3710Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
3711Host is up (0.12s latency).
3712Not shown: 2 filtered ports
3713PORT STATE SERVICE
371453/udp open|filtered domain
371567/udp open|filtered dhcps
371668/udp open|filtered dhcpc
371769/udp open|filtered tftp
371888/udp open|filtered kerberos-sec
3719123/udp open|filtered ntp
3720139/udp open|filtered netbios-ssn
3721161/udp open|filtered snmp
3722162/udp open|filtered snmptrap
3723389/udp open|filtered ldap
3724500/udp open|filtered isakmp
3725520/udp open|filtered route
37262049/udp open|filtered nfs
3727
3728Nmap done: 1 IP address (1 host up) scanned in 3.21 seconds
3729######################################################################################################################################
3730HTTP/1.1 404 Not Found
3731Content-Length: 3
3732Vary: Accept-Encoding
3733Server: DPS/1.6.13
3734X-SiteId: 4000
3735Set-Cookie: dps_site_id=4000; path=/
3736Date: Thu, 24 Oct 2019 22:09:48 GMT
3737Connection: keep-alive
3738#####################################################################################################################################
3739Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 18:10 EDT
3740NSE: Loaded 163 scripts for scanning.
3741NSE: Script Pre-scanning.
3742Initiating NSE at 18:10
3743Completed NSE at 18:10, 0.00s elapsed
3744Initiating NSE at 18:10
3745Completed NSE at 18:10, 0.00s elapsed
3746Initiating Parallel DNS resolution of 1 host. at 18:10
3747Completed Parallel DNS resolution of 1 host. at 18:10, 0.02s elapsed
3748Initiating SYN Stealth Scan at 18:10
3749Scanning ip-160-153-136-3.ip.secureserver.net (160.153.136.3) [1 port]
3750Discovered open port 80/tcp on 160.153.136.3
3751Completed SYN Stealth Scan at 18:10, 0.14s elapsed (1 total ports)
3752Initiating Service scan at 18:10
3753Scanning 1 service on ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
3754Completed Service scan at 18:10, 6.36s elapsed (1 service on 1 host)
3755Initiating OS detection (try #1) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
3756Retrying OS detection (try #2) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
3757Initiating Traceroute at 18:10
3758Completed Traceroute at 18:10, 3.36s elapsed
3759Initiating Parallel DNS resolution of 9 hosts. at 18:10
3760Completed Parallel DNS resolution of 9 hosts. at 18:10, 0.43s elapsed
3761NSE: Script scanning 160.153.136.3.
3762Initiating NSE at 18:10
3763Completed NSE at 18:11, 57.59s elapsed
3764Initiating NSE at 18:11
3765Completed NSE at 18:11, 1.15s elapsed
3766Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
3767Host is up (0.20s latency).
3768
3769PORT STATE SERVICE VERSION
377080/tcp open http Samsung AllShare httpd
3771| http-brute:
3772|_ Path "/" does not require authentication
3773|_http-chrono: Request times for /; avg: 783.55ms; min: 697.96ms; max: 1048.91ms
3774|_http-csrf: Couldn't find any CSRF vulnerabilities.
3775|_http-date: Thu, 24 Oct 2019 22:11:02 GMT; 0s from local time.
3776|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3777|_http-dombased-xss: Couldn't find any DOM based XSS.
3778|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
3779| http-errors:
3780| Spidering limited to: maxpagecount=40; withinhost=ip-160-153-136-3.ip.secureserver.net
3781| Found the following error pages:
3782|
3783| Error Code: 404
3784|_ http://ip-160-153-136-3.ip.secureserver.net:80/
3785|_http-feed: Couldn't find any feeds.
3786|_http-fetch: Please enter the complete path of the directory to save data in.
3787| http-headers:
3788| Content-Length: 3
3789| Vary: Accept-Encoding
3790| Server: DPS/1.6.13
3791| X-SiteId: 4000
3792| Set-Cookie: dps_site_id=4000; path=/
3793| Date: Thu, 24 Oct 2019 22:11:07 GMT
3794| Connection: close
3795|
3796|_ (Request type: GET)
3797|_http-jsonp-detection: Couldn't find any JSONP endpoints.
3798| http-methods:
3799|_ Supported Methods: GET HEAD POST OPTIONS
3800|_http-mobileversion-checker: No mobile version detected.
3801|_http-security-headers:
3802|_http-server-header: DPS/1.6.13
3803| http-sitemap-generator:
3804| Directory structure:
3805| Longest directory structure:
3806| Depth: 0
3807| Dir: /
3808| Total files found (by extension):
3809|_
3810|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
3811|_http-title: Site doesn't have a title.
3812| http-vhosts:
3813|_127 names had status 404
3814|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
3815|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
3816|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3817|_http-xssed: No previously reported XSS vuln.
3818| vulscan: VulDB - https://vuldb.com:
3819| [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
3820| [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
3821| [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
3822| [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
3823| [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
3824| [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
3825| [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
3826| [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
3827| [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
3828| [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
3829| [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
3830| [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
3831| [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
3832| [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
3833| [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
3834| [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
3835| [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
3836| [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
3837| [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
3838| [124425] Samsung Members Intent privilege escalation
3839| [124418] Samsung Internet Browser Object privilege escalation
3840| [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
3841| [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
3842| [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
3843| [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
3844| [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
3845| [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
3846| [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
3847| [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
3848| [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
3849| [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
3850| [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
3851| [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
3852| [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
3853| [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
3854| [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
3855| [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3856| [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
3857| [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
3858| [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
3859| [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
3860| [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
3861| [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3862| [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
3863| [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
3864| [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3865| [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3866| [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3867| [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
3868| [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
3869| [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
3870| [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
3871| [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
3872| [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
3873| [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
3874| [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
3875| [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
3876| [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
3877| [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
3878| [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
3879| [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
3880| [115288] Samsung Mobile Device N(7.x) APK privilege escalation
3881| [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
3882| [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
3883| [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
3884| [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
3885| [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
3886| [112195] Samsung Gear Bluetooth weak authentication
3887| [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
3888| [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
3889| [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
3890| [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
3891| [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
3892| [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
3893| [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
3894| [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
3895| [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
3896| [102728] Samsung Magician 5.0 TLS Certificate weak encryption
3897| [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
3898| [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
3899| [99817] Samsung Galaxy S6 SecEmailSync sql injection
3900| [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
3901| [98938] Samsung Account up to 1.6/2.1 weak encryption
3902| [98937] Samsung GALAXY Apps weak encryption
3903| [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
3904| [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
3905| [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
3906| [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
3907| [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
3908| [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
3909| [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
3910| [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
3911| [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
3912| [94604] Samsung DVR Web Viewer Cookie weak encryption
3913| [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
3914| [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
3915| [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
3916| [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
3917| [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
3918| [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
3919| [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
3920| [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
3921| [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
3922| [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
3923| [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
3924| [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
3925| [80263] Samsung SRN-1670D Web Viewer File information disclosure
3926| [79057] Samsung Galaxy S6 JPEG Image memory corruption
3927| [79056] Samsung Galaxy S6 GIF Image Crash denial of service
3928| [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
3929| [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
3930| [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
3931| [76316] Samsung SBeam 15000 NFC Connection information disclosure
3932| [76087] Samsung Galaxy S5 createFromParcel memory corruption
3933| [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
3934| [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
3935| [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
3936| [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
3937| [74213] Samsung Samsung Security Manager up to 1.29 denial of service
3938| [73144] Samsung SmartViewer ActiveX Control memory corruption
3939| [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
3940| [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
3941| [68531] Samsung Mobile Devices Remote Control Feature denial of service
3942| [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
3943| [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
3944| [12842] Samsung TV D7000 SSID Authentication weak authentication
3945| [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
3946| [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
3947| [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
3948| [64793] Samsung Smart Viewer unknown vulnerability
3949| [64792] Samsung Smart Viewer Web View Cleartext information disclosure
3950| [9717] Samsung PS50C7700 HTTP Request denial of service
3951| [9148] Samsung IP Camera URL Validator cross site scripting
3952| [7892] Samsung UE55ES6800 SOAPACTION denial of service
3953| [63280] Samsung SamsungDive Subsystem unknown vulnerability
3954| [63277] Samsung SamsungDive Subsystem spoofing
3955| [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
3956| [7168] Samsung LED 3D Smart TV memory corruption
3957| [63139] Samsung Kies Air 2.1.210161 Crash denial of service
3958| [63138] Samsung Kies Air 2.1.210161 spoofing
3959| [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
3960| [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
3961| [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
3962| [61634] Samsung NET-i viewer 1.37.120316 denial of service
3963| [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
3964| [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
3965| [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
3966| [60919] Samsung Chromebox 3 unknown vulnerability
3967| [5259] Samsung TV MAC Address memory corruption
3968| [5258] Samsung TV Controller Packet denial of service
3969| [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
3970| [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
3971|
3972| MITRE CVE - https://cve.mitre.org:
3973| [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
3974| [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
3975| [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
3976| [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
3977| [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
3978| [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
3979| [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
3980| [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
3981| [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
3982| [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
3983| [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
3984| [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
3985| [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
3986| [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
3987| [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
3988| [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
3989| [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
3990| [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
3991| [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
3992| [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3993| [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3994| [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3995| [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3996| [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3997| [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
3998| [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
3999| [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
4000| [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
4001| [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
4002| [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
4003| [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
4004| [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
4005| [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
4006|
4007| SecurityFocus - https://www.securityfocus.com/bid/:
4008| [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
4009| [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
4010| [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
4011| [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
4012| [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
4013| [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
4014| [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
4015| [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
4016| [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
4017| [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
4018| [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
4019| [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
4020| [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
4021| [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
4022| [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
4023| [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
4024| [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
4025| [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
4026| [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
4027| [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
4028| [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
4029| [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
4030| [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
4031| [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
4032| [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
4033| [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
4034| [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
4035| [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
4036| [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
4037| [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
4038| [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
4039| [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
4040| [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
4041| [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
4042| [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
4043| [84287] Samsung SW Update Tool Security Bypass Vulnerability
4044| [84284] Samsung SW Update Tool Information Disclosure Vulnerability
4045| [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
4046| [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
4047| [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
4048| [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
4049| [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
4050| [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
4051| [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
4052| [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
4053| [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
4054| [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
4055| [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
4056| [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
4057| [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
4058| [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
4059| [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
4060| [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
4061| [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
4062| [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
4063| [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
4064| [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
4065| [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
4066| [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
4067| [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
4068| [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
4069| [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
4070| [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
4071| [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
4072| [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
4073| [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
4074| [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
4075| [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
4076| [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
4077| [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
4078| [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
4079| [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
4080| [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
4081| [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
4082| [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
4083| [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
4084| [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
4085| [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
4086| [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
4087| [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
4088| [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
4089| [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
4090| [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
4091| [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
4092| [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
4093| [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
4094| [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
4095| [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
4096| [55936] Samsung Kies Multiple Security Vulnerabilities
4097| [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
4098| [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
4099| [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
4100| [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
4101| [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
4102| [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
4103| [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
4104| [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
4105| [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
4106| [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
4107| [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
4108| [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
4109| [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
4110| [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
4111|
4112| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4113| [85904] Samsung PS50C7700 TV denial of service
4114| [85190] Samsung Galaxy S4 spoofing
4115| [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
4116| [82662] Samsung TV SOAPACTION denial of service
4117| [82602] Samsung Galaxy S III Lock Screen security bypass
4118| [82352] Samsung Galaxy S III Passcode Lock security bypass
4119| [80926] Samsung Galaxy security bypass
4120| [80923] Samsung Galaxy SamsungDive information disclosure
4121| [80886] Samsung SmartPhones privilege escalation
4122| [80709] Samsung Galaxy S2 kernel privilege escalation
4123| [80336] Samsung printers backdoor
4124| [80092] Samsung Kies Air security bypass
4125| [80091] Samsung Kies Air GET denial of service
4126| [79445] Samsung Kies ActiveX Control registry key security bypass
4127| [79443] Samsung Kies ActiveX Control security bypass
4128| [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
4129| [79283] Samsung Kies ActiveX CmdAgent.dll code execution
4130| [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
4131| [79193] Samsung Galaxy S III sandbox privilege escalation
4132| [79192] Samsung Galaxy S III document viewer code execution
4133| [78904] Samsung Galaxy S III USSD denial of service
4134| [77811] Samsung Galaxy S2 Epic 4G Touch symlink
4135| [76396] AllShare libpin3_dll.dll denial of service
4136| [75310] Samsung NET-i viewer ActiveX control buffer overflow
4137| [75070] Samsung NET-i ware ActiveX control buffer overflow
4138| [75069] Samsung NET-i ware ActiveX control code execution
4139| [75066] Samsung NET-i ware Master and Storage denial of service
4140| [74928] Multiple Samsung TV and BD products string denial of service
4141| [74927] Multiple Samsung TV and BD products controller packet denial of service
4142| [71316] Samsung Omnia 7 RapiConfig.exe code execution
4143| [67315] Samsung Integrated Management System DMS authentication form SQL Injection
4144| [50110] Samsung SMS messages authentication bypass
4145| [44995] Samsung DVR SHR2040 Web interface denial of service
4146| [35502] Samsung SCX-4200 driver installation script privilege escalation
4147| [19927] Samsung default accounts and passwords allow unauthorized access
4148| [19925] Samsung ADSL Router information disclosure
4149| [15973] Samsung SmartEther allows administrative access
4150| [6845] Samsung ML-85G printer driver /tmp symlink
4151|
4152| Exploit-DB - https://www.exploit-db.com:
4153| [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
4154| [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
4155| [27043] Samsung PS50C7700 TV - Denial of Service
4156| [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
4157| [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
4158| [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
4159| [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
4160| [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
4161| [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
4162| [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
4163| [18751] Samsung D6000 TV Multiple Vulnerabilities
4164| [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
4165|
4166| OpenVAS (Nessus) - http://www.openvas.org:
4167| [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
4168|
4169| SecurityTracker - https://www.securitytracker.com:
4170| [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
4171| [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
4172| [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
4173| [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
4174| [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
4175| [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
4176| [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
4177| [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
4178| [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
4179|
4180| OSVDB - http://www.osvdb.org:
4181| [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
4182| [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
4183| [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
4184| [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
4185| [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
4186| [94223] Samsung Multiple IP Camera URI XSS
4187| [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
4188| [91498] Google Android on Samsung Multiple Unspecified DoS
4189| [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
4190| [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
4191| [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
4192| [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
4193| [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
4194| [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
4195| [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
4196| [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
4197| [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
4198| [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
4199| [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
4200| [88379] Samsung LED 3D TV Unspecified Remote Command Execution
4201| [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
4202| [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
4203| [87872] Samsung Multiple Printers Hardcoded Admin Credentials
4204| [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
4205| [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
4206| [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
4207| [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
4208| [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
4209| [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
4210| [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
4211| [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
4212| [79398] Samsung DWCD Web Interface Default Password (Femtocell)
4213| [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
4214| [72255] Samsung Data Management Server Default Hardcoded root Password
4215| [72227] Samsung Data Management Server Unspecified SQL Injection
4216| [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
4217| [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
4218| [54690] Samsung G3210 Web Interface Default Password
4219| [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
4220| [54688] Samsung G3210 FTP-Server Default Credentials
4221| [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
4222| [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
4223| [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
4224| [16684] Samsung SmartEther Long Password Forced Authentication
4225| [15023] Samsung ADSL Modem Multiple Default Accounts
4226| [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
4227|_
4228Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4229OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
4230No OS matches for host
4231Uptime guess: 0.551 days (since Thu Oct 24 04:58:47 2019)
4232Network Distance: 16 hops
4233TCP Sequence Prediction: Difficulty=261 (Good luck!)
4234IP ID Sequence Generation: All zeros
4235
4236TRACEROUTE (using port 80/tcp)
4237HOP RTT ADDRESS
42381 249.86 ms 10.245.204.1
42392 744.98 ms 45.131.4.2
42403 350.87 ms 109.236.95.230
42414 350.93 ms be4380.rcr21.rtm01.atlas.cogentco.com (149.6.110.73)
42425 350.96 ms be3385.ccr42.ams03.atlas.cogentco.com (154.54.58.197)
42436 ...
42447 351.00 ms 213.19.197.62
42458 351.06 ms THE-GO-DADD.ear3.Amsterdam1.Level3.net (213.19.197.58)
42469 351.03 ms 188.121.32.115
424710 ... 15
424816 245.60 ms ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4249
4250NSE: Script Post-scanning.
4251Initiating NSE at 18:11
4252Completed NSE at 18:11, 0.00s elapsed
4253Initiating NSE at 18:11
4254Completed NSE at 18:11, 0.00s elapsed
4255#####################################################################################################################################
4256Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 18:12 EDT
4257NSE: Loaded 163 scripts for scanning.
4258NSE: Script Pre-scanning.
4259Initiating NSE at 18:12
4260Completed NSE at 18:12, 0.00s elapsed
4261Initiating NSE at 18:12
4262Completed NSE at 18:12, 0.00s elapsed
4263Initiating Parallel DNS resolution of 1 host. at 18:12
4264Completed Parallel DNS resolution of 1 host. at 18:12, 0.02s elapsed
4265Initiating SYN Stealth Scan at 18:12
4266Scanning ip-160-153-136-3.ip.secureserver.net (160.153.136.3) [1 port]
4267Discovered open port 443/tcp on 160.153.136.3
4268Completed SYN Stealth Scan at 18:12, 0.26s elapsed (1 total ports)
4269Initiating Service scan at 18:12
4270Scanning 1 service on ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4271Completed Service scan at 18:12, 13.54s elapsed (1 service on 1 host)
4272Initiating OS detection (try #1) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4273Retrying OS detection (try #2) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4274Initiating Traceroute at 18:12
4275Completed Traceroute at 18:12, 3.21s elapsed
4276Initiating Parallel DNS resolution of 10 hosts. at 18:12
4277Completed Parallel DNS resolution of 10 hosts. at 18:12, 0.30s elapsed
4278NSE: Script scanning 160.153.136.3.
4279Initiating NSE at 18:12
4280Completed NSE at 18:14, 141.16s elapsed
4281Initiating NSE at 18:14
4282Completed NSE at 18:14, 2.27s elapsed
4283Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4284Host is up (0.24s latency).
4285
4286PORT STATE SERVICE VERSION
4287443/tcp open ssl/http Samsung AllShare httpd
4288| http-brute:
4289|_ Path "/" does not require authentication
4290|_http-chrono: Request times for /; avg: 1054.50ms; min: 952.41ms; max: 1237.54ms
4291|_http-csrf: Couldn't find any CSRF vulnerabilities.
4292|_http-date: Thu, 24 Oct 2019 22:12:40 GMT; -5s from local time.
4293|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
4294|_http-dombased-xss: Couldn't find any DOM based XSS.
4295|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
4296| http-errors:
4297| Spidering limited to: maxpagecount=40; withinhost=ip-160-153-136-3.ip.secureserver.net
4298| Found the following error pages:
4299|
4300| Error Code: 404
4301|_ https://ip-160-153-136-3.ip.secureserver.net:443/
4302|_http-feed: Couldn't find any feeds.
4303|_http-fetch: Please enter the complete path of the directory to save data in.
4304| http-headers:
4305| Content-Length: 3
4306| Vary: Accept-Encoding
4307| Server: DPS/1.6.13
4308| X-SiteId: 4000
4309| Set-Cookie: dps_site_id=4000; path=/; secure
4310| Date: Thu, 24 Oct 2019 22:12:54 GMT
4311| Connection: close
4312|
4313|_ (Request type: GET)
4314|_http-jsonp-detection: Couldn't find any JSONP endpoints.
4315| http-methods:
4316|_ Supported Methods: GET HEAD POST OPTIONS
4317|_http-mobileversion-checker: No mobile version detected.
4318| http-security-headers:
4319| Strict_Transport_Security:
4320| HSTS not configured in HTTPS Server
4321| Cookie:
4322|_ Cookies are secured with Secure Flag in HTTPS Connection
4323|_http-server-header: DPS/1.6.13
4324| http-sitemap-generator:
4325| Directory structure:
4326| Longest directory structure:
4327| Depth: 0
4328| Dir: /
4329| Total files found (by extension):
4330|_
4331|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
4332|_http-title: Site doesn't have a title.
4333|_http-traceroute: ERROR: Script execution failed (use -d to debug)
4334| http-vhosts:
4335|_127 names had status 404
4336|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
4337|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
4338|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
4339|_http-xssed: No previously reported XSS vuln.
4340| vulscan: VulDB - https://vuldb.com:
4341| [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
4342| [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
4343| [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
4344| [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
4345| [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
4346| [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
4347| [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
4348| [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
4349| [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
4350| [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
4351| [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
4352| [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
4353| [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
4354| [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
4355| [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
4356| [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
4357| [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
4358| [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
4359| [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
4360| [124425] Samsung Members Intent privilege escalation
4361| [124418] Samsung Internet Browser Object privilege escalation
4362| [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
4363| [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
4364| [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
4365| [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
4366| [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
4367| [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
4368| [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
4369| [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
4370| [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
4371| [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
4372| [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
4373| [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
4374| [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
4375| [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
4376| [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
4377| [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4378| [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
4379| [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
4380| [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
4381| [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
4382| [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
4383| [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4384| [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
4385| [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
4386| [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4387| [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4388| [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4389| [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
4390| [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
4391| [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
4392| [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
4393| [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
4394| [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
4395| [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4396| [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
4397| [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
4398| [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
4399| [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
4400| [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
4401| [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
4402| [115288] Samsung Mobile Device N(7.x) APK privilege escalation
4403| [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
4404| [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
4405| [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
4406| [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
4407| [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
4408| [112195] Samsung Gear Bluetooth weak authentication
4409| [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
4410| [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
4411| [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
4412| [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
4413| [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
4414| [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
4415| [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
4416| [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
4417| [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
4418| [102728] Samsung Magician 5.0 TLS Certificate weak encryption
4419| [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
4420| [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
4421| [99817] Samsung Galaxy S6 SecEmailSync sql injection
4422| [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
4423| [98938] Samsung Account up to 1.6/2.1 weak encryption
4424| [98937] Samsung GALAXY Apps weak encryption
4425| [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
4426| [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
4427| [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
4428| [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
4429| [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
4430| [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
4431| [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
4432| [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
4433| [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
4434| [94604] Samsung DVR Web Viewer Cookie weak encryption
4435| [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
4436| [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
4437| [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
4438| [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
4439| [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
4440| [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
4441| [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
4442| [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
4443| [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
4444| [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
4445| [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
4446| [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
4447| [80263] Samsung SRN-1670D Web Viewer File information disclosure
4448| [79057] Samsung Galaxy S6 JPEG Image memory corruption
4449| [79056] Samsung Galaxy S6 GIF Image Crash denial of service
4450| [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
4451| [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
4452| [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
4453| [76316] Samsung SBeam 15000 NFC Connection information disclosure
4454| [76087] Samsung Galaxy S5 createFromParcel memory corruption
4455| [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
4456| [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
4457| [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
4458| [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
4459| [74213] Samsung Samsung Security Manager up to 1.29 denial of service
4460| [73144] Samsung SmartViewer ActiveX Control memory corruption
4461| [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
4462| [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
4463| [68531] Samsung Mobile Devices Remote Control Feature denial of service
4464| [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
4465| [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
4466| [12842] Samsung TV D7000 SSID Authentication weak authentication
4467| [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
4468| [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
4469| [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
4470| [64793] Samsung Smart Viewer unknown vulnerability
4471| [64792] Samsung Smart Viewer Web View Cleartext information disclosure
4472| [9717] Samsung PS50C7700 HTTP Request denial of service
4473| [9148] Samsung IP Camera URL Validator cross site scripting
4474| [7892] Samsung UE55ES6800 SOAPACTION denial of service
4475| [63280] Samsung SamsungDive Subsystem unknown vulnerability
4476| [63277] Samsung SamsungDive Subsystem spoofing
4477| [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
4478| [7168] Samsung LED 3D Smart TV memory corruption
4479| [63139] Samsung Kies Air 2.1.210161 Crash denial of service
4480| [63138] Samsung Kies Air 2.1.210161 spoofing
4481| [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
4482| [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
4483| [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
4484| [61634] Samsung NET-i viewer 1.37.120316 denial of service
4485| [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
4486| [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
4487| [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
4488| [60919] Samsung Chromebox 3 unknown vulnerability
4489| [5259] Samsung TV MAC Address memory corruption
4490| [5258] Samsung TV Controller Packet denial of service
4491| [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
4492| [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
4493|
4494| MITRE CVE - https://cve.mitre.org:
4495| [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
4496| [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
4497| [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
4498| [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
4499| [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
4500| [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
4501| [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
4502| [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
4503| [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
4504| [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
4505| [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
4506| [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
4507| [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
4508| [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
4509| [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
4510| [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
4511| [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
4512| [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
4513| [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
4514| [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
4515| [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
4516| [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
4517| [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
4518| [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
4519| [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
4520| [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
4521| [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
4522| [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
4523| [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
4524| [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
4525| [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
4526| [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
4527| [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
4528|
4529| SecurityFocus - https://www.securityfocus.com/bid/:
4530| [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
4531| [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
4532| [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
4533| [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
4534| [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
4535| [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
4536| [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
4537| [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
4538| [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
4539| [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
4540| [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
4541| [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
4542| [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
4543| [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
4544| [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
4545| [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
4546| [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
4547| [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
4548| [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
4549| [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
4550| [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
4551| [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
4552| [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
4553| [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
4554| [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
4555| [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
4556| [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
4557| [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
4558| [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
4559| [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
4560| [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
4561| [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
4562| [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
4563| [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
4564| [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
4565| [84287] Samsung SW Update Tool Security Bypass Vulnerability
4566| [84284] Samsung SW Update Tool Information Disclosure Vulnerability
4567| [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
4568| [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
4569| [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
4570| [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
4571| [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
4572| [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
4573| [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
4574| [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
4575| [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
4576| [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
4577| [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
4578| [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
4579| [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
4580| [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
4581| [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
4582| [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
4583| [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
4584| [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
4585| [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
4586| [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
4587| [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
4588| [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
4589| [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
4590| [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
4591| [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
4592| [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
4593| [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
4594| [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
4595| [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
4596| [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
4597| [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
4598| [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
4599| [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
4600| [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
4601| [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
4602| [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
4603| [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
4604| [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
4605| [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
4606| [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
4607| [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
4608| [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
4609| [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
4610| [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
4611| [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
4612| [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
4613| [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
4614| [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
4615| [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
4616| [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
4617| [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
4618| [55936] Samsung Kies Multiple Security Vulnerabilities
4619| [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
4620| [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
4621| [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
4622| [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
4623| [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
4624| [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
4625| [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
4626| [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
4627| [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
4628| [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
4629| [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
4630| [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
4631| [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
4632| [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
4633|
4634| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4635| [85904] Samsung PS50C7700 TV denial of service
4636| [85190] Samsung Galaxy S4 spoofing
4637| [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
4638| [82662] Samsung TV SOAPACTION denial of service
4639| [82602] Samsung Galaxy S III Lock Screen security bypass
4640| [82352] Samsung Galaxy S III Passcode Lock security bypass
4641| [80926] Samsung Galaxy security bypass
4642| [80923] Samsung Galaxy SamsungDive information disclosure
4643| [80886] Samsung SmartPhones privilege escalation
4644| [80709] Samsung Galaxy S2 kernel privilege escalation
4645| [80336] Samsung printers backdoor
4646| [80092] Samsung Kies Air security bypass
4647| [80091] Samsung Kies Air GET denial of service
4648| [79445] Samsung Kies ActiveX Control registry key security bypass
4649| [79443] Samsung Kies ActiveX Control security bypass
4650| [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
4651| [79283] Samsung Kies ActiveX CmdAgent.dll code execution
4652| [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
4653| [79193] Samsung Galaxy S III sandbox privilege escalation
4654| [79192] Samsung Galaxy S III document viewer code execution
4655| [78904] Samsung Galaxy S III USSD denial of service
4656| [77811] Samsung Galaxy S2 Epic 4G Touch symlink
4657| [76396] AllShare libpin3_dll.dll denial of service
4658| [75310] Samsung NET-i viewer ActiveX control buffer overflow
4659| [75070] Samsung NET-i ware ActiveX control buffer overflow
4660| [75069] Samsung NET-i ware ActiveX control code execution
4661| [75066] Samsung NET-i ware Master and Storage denial of service
4662| [74928] Multiple Samsung TV and BD products string denial of service
4663| [74927] Multiple Samsung TV and BD products controller packet denial of service
4664| [71316] Samsung Omnia 7 RapiConfig.exe code execution
4665| [67315] Samsung Integrated Management System DMS authentication form SQL Injection
4666| [50110] Samsung SMS messages authentication bypass
4667| [44995] Samsung DVR SHR2040 Web interface denial of service
4668| [35502] Samsung SCX-4200 driver installation script privilege escalation
4669| [19927] Samsung default accounts and passwords allow unauthorized access
4670| [19925] Samsung ADSL Router information disclosure
4671| [15973] Samsung SmartEther allows administrative access
4672| [6845] Samsung ML-85G printer driver /tmp symlink
4673|
4674| Exploit-DB - https://www.exploit-db.com:
4675| [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
4676| [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
4677| [27043] Samsung PS50C7700 TV - Denial of Service
4678| [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
4679| [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
4680| [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
4681| [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
4682| [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
4683| [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
4684| [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
4685| [18751] Samsung D6000 TV Multiple Vulnerabilities
4686| [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
4687|
4688| OpenVAS (Nessus) - http://www.openvas.org:
4689| [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
4690|
4691| SecurityTracker - https://www.securitytracker.com:
4692| [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
4693| [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
4694| [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
4695| [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
4696| [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
4697| [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
4698| [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
4699| [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
4700| [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
4701|
4702| OSVDB - http://www.osvdb.org:
4703| [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
4704| [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
4705| [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
4706| [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
4707| [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
4708| [94223] Samsung Multiple IP Camera URI XSS
4709| [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
4710| [91498] Google Android on Samsung Multiple Unspecified DoS
4711| [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
4712| [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
4713| [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
4714| [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
4715| [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
4716| [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
4717| [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
4718| [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
4719| [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
4720| [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
4721| [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
4722| [88379] Samsung LED 3D TV Unspecified Remote Command Execution
4723| [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
4724| [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
4725| [87872] Samsung Multiple Printers Hardcoded Admin Credentials
4726| [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
4727| [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
4728| [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
4729| [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
4730| [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
4731| [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
4732| [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
4733| [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
4734| [79398] Samsung DWCD Web Interface Default Password (Femtocell)
4735| [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
4736| [72255] Samsung Data Management Server Default Hardcoded root Password
4737| [72227] Samsung Data Management Server Unspecified SQL Injection
4738| [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
4739| [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
4740| [54690] Samsung G3210 Web Interface Default Password
4741| [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
4742| [54688] Samsung G3210 FTP-Server Default Credentials
4743| [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
4744| [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
4745| [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
4746| [16684] Samsung SmartEther Long Password Forced Authentication
4747| [15023] Samsung ADSL Modem Multiple Default Accounts
4748| [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
4749|_
4750Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4751OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
4752No OS matches for host
4753Uptime guess: 0.005 days (since Thu Oct 24 18:07:11 2019)
4754Network Distance: 15 hops
4755TCP Sequence Prediction: Difficulty=262 (Good luck!)
4756IP ID Sequence Generation: All zeros
4757
4758TRACEROUTE (using port 443/tcp)
4759HOP RTT ADDRESS
47601 201.91 ms 10.245.204.1
47612 201.96 ms 45.131.4.3
47623 201.96 ms 109.236.95.228
47634 201.99 ms be4381.rcr21.rtm01.atlas.cogentco.com (149.6.110.89)
47645 202.01 ms be3385.ccr42.ams03.atlas.cogentco.com (154.54.58.197)
47656 202.05 ms ae-6.edge7.Amsterdam1.Level3.net (4.68.37.101)
47667 202.07 ms THE-GO-DADD.ear3.Amsterdam1.Level3.net (213.19.197.58)
47678 202.09 ms ae2.bbsa0106-01.ams3.bb.godaddy.com (188.121.32.5)
47689 202.05 ms 188.121.32.115
476910 ... 14
477015 299.35 ms ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4771
4772NSE: Script Post-scanning.
4773Initiating NSE at 18:14
4774Completed NSE at 18:14, 0.00s elapsed
4775Initiating NSE at 18:14
4776Completed NSE at 18:14, 0.00s elapsed
4777#####################################################################################################################################
4778Version: 1.11.13-static
4779OpenSSL 1.0.2-chacha (1.0.2g-dev)
4780
4781Connected to 160.153.136.3
4782
4783Testing SSL server 160.153.136.3 on port 443 using SNI name 160.153.136.3
4784
4785 TLS Fallback SCSV:
4786Server supports TLS Fallback SCSV
4787
4788 TLS renegotiation:
4789Session renegotiation not supported
4790
4791 TLS Compression:
4792Compression disabled
4793
4794 Heartbleed:
4795TLS 1.2 not vulnerable to heartbleed
4796TLS 1.1 not vulnerable to heartbleed
4797TLS 1.0 not vulnerable to heartbleed
4798
4799 Supported Server Cipher(s):
4800Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
4801Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
4802Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
4803Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
4804Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
4805Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
4806Accepted TLSv1.2 128 bits AES128-GCM-SHA256
4807Accepted TLSv1.2 256 bits AES256-GCM-SHA384
4808Accepted TLSv1.2 128 bits AES128-SHA256
4809Accepted TLSv1.2 256 bits AES256-SHA256
4810Accepted TLSv1.2 128 bits AES128-SHA
4811Accepted TLSv1.2 256 bits AES256-SHA
4812
4813 SSL Certificate:
4814Signature Algorithm: sha256WithRSAEncryption
4815RSA Key Strength: 2048
4816
4817Subject: *.godaddysites.com
4818Altnames: DNS:*.godaddysites.com, DNS:godaddysites.com
4819Issuer: Go Daddy Secure Certificate Authority - G2
4820
4821Not valid before: Aug 3 16:00:21 2018 GMT
4822Not valid after: Aug 3 16:00:21 2020 GMT
4823#####################################################################################################################################
4824Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 18:19 EDT
4825NSE: Loaded 47 scripts for scanning.
4826NSE: Script Pre-scanning.
4827Initiating NSE at 18:19
4828Completed NSE at 18:19, 0.00s elapsed
4829Initiating NSE at 18:19
4830Completed NSE at 18:19, 0.00s elapsed
4831Initiating Ping Scan at 18:19
4832Scanning 160.153.136.3 [4 ports]
4833Completed Ping Scan at 18:19, 0.22s elapsed (1 total hosts)
4834Initiating Parallel DNS resolution of 1 host. at 18:19
4835Completed Parallel DNS resolution of 1 host. at 18:19, 0.02s elapsed
4836Initiating SYN Stealth Scan at 18:19
4837Scanning ip-160-153-136-3.ip.secureserver.net (160.153.136.3) [65535 ports]
4838Discovered open port 80/tcp on 160.153.136.3
4839Discovered open port 443/tcp on 160.153.136.3
4840SYN Stealth Scan Timing: About 5.47% done; ETC: 18:28 (0:08:56 remaining)
4841SYN Stealth Scan Timing: About 14.82% done; ETC: 18:26 (0:05:50 remaining)
4842SYN Stealth Scan Timing: About 25.64% done; ETC: 18:25 (0:04:24 remaining)
4843SYN Stealth Scan Timing: About 33.14% done; ETC: 18:25 (0:04:04 remaining)
4844SYN Stealth Scan Timing: About 40.37% done; ETC: 18:25 (0:03:43 remaining)
4845SYN Stealth Scan Timing: About 49.06% done; ETC: 18:25 (0:03:08 remaining)
4846SYN Stealth Scan Timing: About 55.65% done; ETC: 18:25 (0:02:48 remaining)
4847SYN Stealth Scan Timing: About 64.52% done; ETC: 18:25 (0:02:13 remaining)
4848SYN Stealth Scan Timing: About 74.24% done; ETC: 18:25 (0:01:34 remaining)
4849SYN Stealth Scan Timing: About 84.14% done; ETC: 18:25 (0:00:57 remaining)
4850Completed SYN Stealth Scan at 18:25, 334.19s elapsed (65535 total ports)
4851Initiating Service scan at 18:25
4852Scanning 2 services on ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4853Completed Service scan at 18:25, 13.34s elapsed (2 services on 1 host)
4854Initiating OS detection (try #1) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4855Retrying OS detection (try #2) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4856Initiating Traceroute at 18:25
4857Completed Traceroute at 18:25, 0.25s elapsed
4858Initiating Parallel DNS resolution of 2 hosts. at 18:25
4859Completed Parallel DNS resolution of 2 hosts. at 18:25, 0.00s elapsed
4860NSE: Script scanning 160.153.136.3.
4861Initiating NSE at 18:25
4862Completed NSE at 18:25, 6.89s elapsed
4863Initiating NSE at 18:25
4864Completed NSE at 18:25, 2.26s elapsed
4865Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
4866Host is up (0.23s latency).
4867Not shown: 65530 filtered ports
4868PORT STATE SERVICE VERSION
486925/tcp closed smtp
487080/tcp open http Samsung AllShare httpd
4871|_http-server-header: DPS/1.6.13
4872| vulscan: VulDB - https://vuldb.com:
4873| [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
4874| [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
4875| [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
4876| [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
4877| [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
4878| [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
4879| [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
4880| [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
4881| [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
4882| [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
4883| [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
4884| [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
4885| [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
4886| [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
4887| [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
4888| [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
4889| [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
4890| [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
4891| [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
4892| [124425] Samsung Members Intent privilege escalation
4893| [124418] Samsung Internet Browser Object privilege escalation
4894| [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
4895| [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
4896| [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
4897| [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
4898| [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
4899| [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
4900| [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
4901| [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
4902| [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
4903| [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
4904| [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
4905| [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
4906| [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
4907| [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
4908| [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
4909| [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4910| [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
4911| [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
4912| [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
4913| [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
4914| [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
4915| [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4916| [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
4917| [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
4918| [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4919| [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4920| [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4921| [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
4922| [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
4923| [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
4924| [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
4925| [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
4926| [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
4927| [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
4928| [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
4929| [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
4930| [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
4931| [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
4932| [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
4933| [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
4934| [115288] Samsung Mobile Device N(7.x) APK privilege escalation
4935| [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
4936| [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
4937| [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
4938| [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
4939| [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
4940| [112195] Samsung Gear Bluetooth weak authentication
4941| [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
4942| [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
4943| [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
4944| [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
4945| [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
4946| [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
4947| [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
4948| [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
4949| [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
4950| [102728] Samsung Magician 5.0 TLS Certificate weak encryption
4951| [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
4952| [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
4953| [99817] Samsung Galaxy S6 SecEmailSync sql injection
4954| [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
4955| [98938] Samsung Account up to 1.6/2.1 weak encryption
4956| [98937] Samsung GALAXY Apps weak encryption
4957| [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
4958| [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
4959| [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
4960| [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
4961| [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
4962| [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
4963| [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
4964| [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
4965| [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
4966| [94604] Samsung DVR Web Viewer Cookie weak encryption
4967| [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
4968| [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
4969| [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
4970| [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
4971| [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
4972| [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
4973| [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
4974| [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
4975| [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
4976| [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
4977| [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
4978| [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
4979| [80263] Samsung SRN-1670D Web Viewer File information disclosure
4980| [79057] Samsung Galaxy S6 JPEG Image memory corruption
4981| [79056] Samsung Galaxy S6 GIF Image Crash denial of service
4982| [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
4983| [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
4984| [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
4985| [76316] Samsung SBeam 15000 NFC Connection information disclosure
4986| [76087] Samsung Galaxy S5 createFromParcel memory corruption
4987| [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
4988| [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
4989| [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
4990| [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
4991| [74213] Samsung Samsung Security Manager up to 1.29 denial of service
4992| [73144] Samsung SmartViewer ActiveX Control memory corruption
4993| [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
4994| [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
4995| [68531] Samsung Mobile Devices Remote Control Feature denial of service
4996| [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
4997| [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
4998| [12842] Samsung TV D7000 SSID Authentication weak authentication
4999| [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
5000| [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
5001| [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
5002| [64793] Samsung Smart Viewer unknown vulnerability
5003| [64792] Samsung Smart Viewer Web View Cleartext information disclosure
5004| [9717] Samsung PS50C7700 HTTP Request denial of service
5005| [9148] Samsung IP Camera URL Validator cross site scripting
5006| [7892] Samsung UE55ES6800 SOAPACTION denial of service
5007| [63280] Samsung SamsungDive Subsystem unknown vulnerability
5008| [63277] Samsung SamsungDive Subsystem spoofing
5009| [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
5010| [7168] Samsung LED 3D Smart TV memory corruption
5011| [63139] Samsung Kies Air 2.1.210161 Crash denial of service
5012| [63138] Samsung Kies Air 2.1.210161 spoofing
5013| [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
5014| [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
5015| [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
5016| [61634] Samsung NET-i viewer 1.37.120316 denial of service
5017| [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
5018| [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
5019| [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
5020| [60919] Samsung Chromebox 3 unknown vulnerability
5021| [5259] Samsung TV MAC Address memory corruption
5022| [5258] Samsung TV Controller Packet denial of service
5023| [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
5024| [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
5025|
5026| MITRE CVE - https://cve.mitre.org:
5027| [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
5028| [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
5029| [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
5030| [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
5031| [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
5032| [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
5033| [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
5034| [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
5035| [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
5036| [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
5037| [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
5038| [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
5039| [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
5040| [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
5041| [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
5042| [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
5043| [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
5044| [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
5045| [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
5046| [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5047| [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5048| [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5049| [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5050| [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5051| [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5052| [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
5053| [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
5054| [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
5055| [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
5056| [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
5057| [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
5058| [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
5059| [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
5060|
5061| SecurityFocus - https://www.securityfocus.com/bid/:
5062| [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
5063| [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
5064| [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
5065| [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
5066| [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
5067| [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
5068| [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
5069| [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
5070| [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
5071| [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
5072| [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
5073| [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
5074| [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
5075| [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
5076| [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
5077| [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
5078| [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
5079| [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
5080| [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
5081| [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
5082| [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
5083| [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
5084| [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
5085| [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
5086| [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
5087| [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
5088| [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
5089| [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
5090| [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
5091| [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
5092| [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
5093| [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
5094| [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
5095| [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
5096| [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
5097| [84287] Samsung SW Update Tool Security Bypass Vulnerability
5098| [84284] Samsung SW Update Tool Information Disclosure Vulnerability
5099| [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
5100| [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
5101| [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
5102| [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
5103| [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
5104| [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
5105| [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
5106| [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
5107| [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
5108| [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
5109| [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
5110| [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
5111| [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
5112| [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
5113| [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
5114| [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
5115| [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
5116| [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
5117| [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
5118| [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
5119| [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
5120| [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
5121| [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
5122| [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
5123| [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
5124| [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
5125| [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
5126| [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
5127| [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
5128| [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
5129| [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
5130| [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
5131| [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
5132| [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
5133| [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
5134| [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
5135| [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
5136| [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
5137| [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
5138| [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
5139| [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
5140| [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
5141| [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
5142| [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
5143| [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
5144| [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
5145| [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
5146| [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
5147| [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
5148| [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
5149| [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
5150| [55936] Samsung Kies Multiple Security Vulnerabilities
5151| [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
5152| [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
5153| [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
5154| [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
5155| [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
5156| [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
5157| [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
5158| [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
5159| [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
5160| [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
5161| [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
5162| [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
5163| [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
5164| [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
5165|
5166| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5167| [85904] Samsung PS50C7700 TV denial of service
5168| [85190] Samsung Galaxy S4 spoofing
5169| [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
5170| [82662] Samsung TV SOAPACTION denial of service
5171| [82602] Samsung Galaxy S III Lock Screen security bypass
5172| [82352] Samsung Galaxy S III Passcode Lock security bypass
5173| [80926] Samsung Galaxy security bypass
5174| [80923] Samsung Galaxy SamsungDive information disclosure
5175| [80886] Samsung SmartPhones privilege escalation
5176| [80709] Samsung Galaxy S2 kernel privilege escalation
5177| [80336] Samsung printers backdoor
5178| [80092] Samsung Kies Air security bypass
5179| [80091] Samsung Kies Air GET denial of service
5180| [79445] Samsung Kies ActiveX Control registry key security bypass
5181| [79443] Samsung Kies ActiveX Control security bypass
5182| [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
5183| [79283] Samsung Kies ActiveX CmdAgent.dll code execution
5184| [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
5185| [79193] Samsung Galaxy S III sandbox privilege escalation
5186| [79192] Samsung Galaxy S III document viewer code execution
5187| [78904] Samsung Galaxy S III USSD denial of service
5188| [77811] Samsung Galaxy S2 Epic 4G Touch symlink
5189| [76396] AllShare libpin3_dll.dll denial of service
5190| [75310] Samsung NET-i viewer ActiveX control buffer overflow
5191| [75070] Samsung NET-i ware ActiveX control buffer overflow
5192| [75069] Samsung NET-i ware ActiveX control code execution
5193| [75066] Samsung NET-i ware Master and Storage denial of service
5194| [74928] Multiple Samsung TV and BD products string denial of service
5195| [74927] Multiple Samsung TV and BD products controller packet denial of service
5196| [71316] Samsung Omnia 7 RapiConfig.exe code execution
5197| [67315] Samsung Integrated Management System DMS authentication form SQL Injection
5198| [50110] Samsung SMS messages authentication bypass
5199| [44995] Samsung DVR SHR2040 Web interface denial of service
5200| [35502] Samsung SCX-4200 driver installation script privilege escalation
5201| [19927] Samsung default accounts and passwords allow unauthorized access
5202| [19925] Samsung ADSL Router information disclosure
5203| [15973] Samsung SmartEther allows administrative access
5204| [6845] Samsung ML-85G printer driver /tmp symlink
5205|
5206| Exploit-DB - https://www.exploit-db.com:
5207| [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
5208| [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
5209| [27043] Samsung PS50C7700 TV - Denial of Service
5210| [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
5211| [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
5212| [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
5213| [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
5214| [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
5215| [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
5216| [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
5217| [18751] Samsung D6000 TV Multiple Vulnerabilities
5218| [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
5219|
5220| OpenVAS (Nessus) - http://www.openvas.org:
5221| [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
5222|
5223| SecurityTracker - https://www.securitytracker.com:
5224| [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
5225| [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
5226| [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
5227| [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
5228| [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
5229| [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
5230| [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
5231| [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
5232| [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
5233|
5234| OSVDB - http://www.osvdb.org:
5235| [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
5236| [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
5237| [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
5238| [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
5239| [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
5240| [94223] Samsung Multiple IP Camera URI XSS
5241| [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
5242| [91498] Google Android on Samsung Multiple Unspecified DoS
5243| [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
5244| [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
5245| [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
5246| [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
5247| [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
5248| [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
5249| [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
5250| [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
5251| [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
5252| [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
5253| [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
5254| [88379] Samsung LED 3D TV Unspecified Remote Command Execution
5255| [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
5256| [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
5257| [87872] Samsung Multiple Printers Hardcoded Admin Credentials
5258| [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
5259| [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
5260| [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
5261| [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
5262| [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
5263| [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
5264| [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
5265| [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
5266| [79398] Samsung DWCD Web Interface Default Password (Femtocell)
5267| [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
5268| [72255] Samsung Data Management Server Default Hardcoded root Password
5269| [72227] Samsung Data Management Server Unspecified SQL Injection
5270| [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
5271| [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
5272| [54690] Samsung G3210 Web Interface Default Password
5273| [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
5274| [54688] Samsung G3210 FTP-Server Default Credentials
5275| [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
5276| [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
5277| [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
5278| [16684] Samsung SmartEther Long Password Forced Authentication
5279| [15023] Samsung ADSL Modem Multiple Default Accounts
5280| [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
5281|_
5282139/tcp closed netbios-ssn
5283443/tcp open ssl/http Samsung AllShare httpd
5284|_http-server-header: DPS/1.6.13
5285| vulscan: VulDB - https://vuldb.com:
5286| [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
5287| [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
5288| [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
5289| [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
5290| [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
5291| [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
5292| [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
5293| [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
5294| [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
5295| [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
5296| [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
5297| [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
5298| [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
5299| [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
5300| [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
5301| [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
5302| [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
5303| [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
5304| [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
5305| [124425] Samsung Members Intent privilege escalation
5306| [124418] Samsung Internet Browser Object privilege escalation
5307| [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
5308| [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
5309| [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
5310| [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
5311| [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
5312| [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
5313| [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
5314| [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
5315| [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
5316| [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
5317| [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
5318| [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
5319| [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
5320| [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
5321| [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
5322| [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
5323| [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
5324| [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
5325| [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
5326| [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
5327| [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
5328| [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
5329| [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
5330| [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
5331| [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
5332| [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
5333| [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
5334| [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
5335| [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
5336| [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
5337| [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
5338| [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
5339| [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
5340| [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
5341| [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
5342| [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
5343| [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
5344| [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
5345| [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
5346| [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
5347| [115288] Samsung Mobile Device N(7.x) APK privilege escalation
5348| [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
5349| [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
5350| [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
5351| [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
5352| [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
5353| [112195] Samsung Gear Bluetooth weak authentication
5354| [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
5355| [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
5356| [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
5357| [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
5358| [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
5359| [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
5360| [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
5361| [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
5362| [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
5363| [102728] Samsung Magician 5.0 TLS Certificate weak encryption
5364| [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
5365| [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
5366| [99817] Samsung Galaxy S6 SecEmailSync sql injection
5367| [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
5368| [98938] Samsung Account up to 1.6/2.1 weak encryption
5369| [98937] Samsung GALAXY Apps weak encryption
5370| [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
5371| [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
5372| [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
5373| [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
5374| [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
5375| [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
5376| [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
5377| [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
5378| [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
5379| [94604] Samsung DVR Web Viewer Cookie weak encryption
5380| [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
5381| [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
5382| [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
5383| [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
5384| [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
5385| [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
5386| [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
5387| [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
5388| [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
5389| [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
5390| [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
5391| [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
5392| [80263] Samsung SRN-1670D Web Viewer File information disclosure
5393| [79057] Samsung Galaxy S6 JPEG Image memory corruption
5394| [79056] Samsung Galaxy S6 GIF Image Crash denial of service
5395| [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
5396| [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
5397| [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
5398| [76316] Samsung SBeam 15000 NFC Connection information disclosure
5399| [76087] Samsung Galaxy S5 createFromParcel memory corruption
5400| [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
5401| [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
5402| [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
5403| [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
5404| [74213] Samsung Samsung Security Manager up to 1.29 denial of service
5405| [73144] Samsung SmartViewer ActiveX Control memory corruption
5406| [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
5407| [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
5408| [68531] Samsung Mobile Devices Remote Control Feature denial of service
5409| [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
5410| [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
5411| [12842] Samsung TV D7000 SSID Authentication weak authentication
5412| [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
5413| [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
5414| [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
5415| [64793] Samsung Smart Viewer unknown vulnerability
5416| [64792] Samsung Smart Viewer Web View Cleartext information disclosure
5417| [9717] Samsung PS50C7700 HTTP Request denial of service
5418| [9148] Samsung IP Camera URL Validator cross site scripting
5419| [7892] Samsung UE55ES6800 SOAPACTION denial of service
5420| [63280] Samsung SamsungDive Subsystem unknown vulnerability
5421| [63277] Samsung SamsungDive Subsystem spoofing
5422| [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
5423| [7168] Samsung LED 3D Smart TV memory corruption
5424| [63139] Samsung Kies Air 2.1.210161 Crash denial of service
5425| [63138] Samsung Kies Air 2.1.210161 spoofing
5426| [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
5427| [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
5428| [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
5429| [61634] Samsung NET-i viewer 1.37.120316 denial of service
5430| [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
5431| [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
5432| [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
5433| [60919] Samsung Chromebox 3 unknown vulnerability
5434| [5259] Samsung TV MAC Address memory corruption
5435| [5258] Samsung TV Controller Packet denial of service
5436| [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
5437| [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
5438|
5439| MITRE CVE - https://cve.mitre.org:
5440| [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
5441| [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
5442| [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
5443| [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
5444| [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
5445| [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
5446| [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
5447| [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
5448| [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
5449| [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
5450| [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
5451| [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
5452| [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
5453| [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
5454| [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
5455| [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
5456| [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
5457| [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
5458| [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
5459| [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5460| [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5461| [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5462| [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5463| [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5464| [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
5465| [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
5466| [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
5467| [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
5468| [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
5469| [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
5470| [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
5471| [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
5472| [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
5473|
5474| SecurityFocus - https://www.securityfocus.com/bid/:
5475| [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
5476| [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
5477| [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
5478| [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
5479| [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
5480| [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
5481| [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
5482| [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
5483| [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
5484| [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
5485| [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
5486| [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
5487| [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
5488| [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
5489| [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
5490| [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
5491| [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
5492| [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
5493| [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
5494| [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
5495| [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
5496| [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
5497| [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
5498| [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
5499| [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
5500| [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
5501| [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
5502| [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
5503| [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
5504| [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
5505| [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
5506| [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
5507| [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
5508| [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
5509| [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
5510| [84287] Samsung SW Update Tool Security Bypass Vulnerability
5511| [84284] Samsung SW Update Tool Information Disclosure Vulnerability
5512| [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
5513| [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
5514| [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
5515| [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
5516| [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
5517| [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
5518| [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
5519| [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
5520| [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
5521| [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
5522| [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
5523| [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
5524| [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
5525| [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
5526| [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
5527| [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
5528| [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
5529| [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
5530| [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
5531| [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
5532| [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
5533| [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
5534| [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
5535| [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
5536| [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
5537| [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
5538| [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
5539| [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
5540| [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
5541| [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
5542| [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
5543| [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
5544| [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
5545| [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
5546| [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
5547| [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
5548| [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
5549| [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
5550| [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
5551| [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
5552| [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
5553| [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
5554| [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
5555| [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
5556| [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
5557| [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
5558| [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
5559| [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
5560| [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
5561| [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
5562| [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
5563| [55936] Samsung Kies Multiple Security Vulnerabilities
5564| [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
5565| [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
5566| [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
5567| [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
5568| [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
5569| [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
5570| [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
5571| [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
5572| [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
5573| [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
5574| [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
5575| [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
5576| [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
5577| [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
5578|
5579| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5580| [85904] Samsung PS50C7700 TV denial of service
5581| [85190] Samsung Galaxy S4 spoofing
5582| [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
5583| [82662] Samsung TV SOAPACTION denial of service
5584| [82602] Samsung Galaxy S III Lock Screen security bypass
5585| [82352] Samsung Galaxy S III Passcode Lock security bypass
5586| [80926] Samsung Galaxy security bypass
5587| [80923] Samsung Galaxy SamsungDive information disclosure
5588| [80886] Samsung SmartPhones privilege escalation
5589| [80709] Samsung Galaxy S2 kernel privilege escalation
5590| [80336] Samsung printers backdoor
5591| [80092] Samsung Kies Air security bypass
5592| [80091] Samsung Kies Air GET denial of service
5593| [79445] Samsung Kies ActiveX Control registry key security bypass
5594| [79443] Samsung Kies ActiveX Control security bypass
5595| [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
5596| [79283] Samsung Kies ActiveX CmdAgent.dll code execution
5597| [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
5598| [79193] Samsung Galaxy S III sandbox privilege escalation
5599| [79192] Samsung Galaxy S III document viewer code execution
5600| [78904] Samsung Galaxy S III USSD denial of service
5601| [77811] Samsung Galaxy S2 Epic 4G Touch symlink
5602| [76396] AllShare libpin3_dll.dll denial of service
5603| [75310] Samsung NET-i viewer ActiveX control buffer overflow
5604| [75070] Samsung NET-i ware ActiveX control buffer overflow
5605| [75069] Samsung NET-i ware ActiveX control code execution
5606| [75066] Samsung NET-i ware Master and Storage denial of service
5607| [74928] Multiple Samsung TV and BD products string denial of service
5608| [74927] Multiple Samsung TV and BD products controller packet denial of service
5609| [71316] Samsung Omnia 7 RapiConfig.exe code execution
5610| [67315] Samsung Integrated Management System DMS authentication form SQL Injection
5611| [50110] Samsung SMS messages authentication bypass
5612| [44995] Samsung DVR SHR2040 Web interface denial of service
5613| [35502] Samsung SCX-4200 driver installation script privilege escalation
5614| [19927] Samsung default accounts and passwords allow unauthorized access
5615| [19925] Samsung ADSL Router information disclosure
5616| [15973] Samsung SmartEther allows administrative access
5617| [6845] Samsung ML-85G printer driver /tmp symlink
5618|
5619| Exploit-DB - https://www.exploit-db.com:
5620| [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
5621| [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
5622| [27043] Samsung PS50C7700 TV - Denial of Service
5623| [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
5624| [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
5625| [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
5626| [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
5627| [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
5628| [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
5629| [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
5630| [18751] Samsung D6000 TV Multiple Vulnerabilities
5631| [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
5632|
5633| OpenVAS (Nessus) - http://www.openvas.org:
5634| [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
5635|
5636| SecurityTracker - https://www.securitytracker.com:
5637| [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
5638| [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
5639| [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
5640| [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
5641| [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
5642| [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
5643| [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
5644| [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
5645| [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
5646|
5647| OSVDB - http://www.osvdb.org:
5648| [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
5649| [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
5650| [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
5651| [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
5652| [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
5653| [94223] Samsung Multiple IP Camera URI XSS
5654| [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
5655| [91498] Google Android on Samsung Multiple Unspecified DoS
5656| [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
5657| [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
5658| [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
5659| [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
5660| [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
5661| [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
5662| [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
5663| [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
5664| [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
5665| [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
5666| [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
5667| [88379] Samsung LED 3D TV Unspecified Remote Command Execution
5668| [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
5669| [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
5670| [87872] Samsung Multiple Printers Hardcoded Admin Credentials
5671| [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
5672| [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
5673| [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
5674| [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
5675| [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
5676| [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
5677| [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
5678| [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
5679| [79398] Samsung DWCD Web Interface Default Password (Femtocell)
5680| [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
5681| [72255] Samsung Data Management Server Default Hardcoded root Password
5682| [72227] Samsung Data Management Server Unspecified SQL Injection
5683| [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
5684| [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
5685| [54690] Samsung G3210 Web Interface Default Password
5686| [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
5687| [54688] Samsung G3210 FTP-Server Default Credentials
5688| [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
5689| [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
5690| [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
5691| [16684] Samsung SmartEther Long Password Forced Authentication
5692| [15023] Samsung ADSL Modem Multiple Default Accounts
5693| [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
5694|_
5695445/tcp closed microsoft-ds
5696Device type: general purpose
5697Running (JUST GUESSING): Linux 2.6.X (90%)
5698OS CPE: cpe:/o:linux:linux_kernel:2.6
5699Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (90%)
5700No exact OS matches for host (test conditions non-ideal).
5701Uptime guess: 0.013 days (since Thu Oct 24 18:07:06 2019)
5702Network Distance: 2 hops
5703TCP Sequence Prediction: Difficulty=261 (Good luck!)
5704IP ID Sequence Generation: All zeros
5705
5706TRACEROUTE (using port 445/tcp)
5707HOP RTT ADDRESS
57081 242.87 ms 10.245.204.1
57092 242.87 ms ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
5710
5711NSE: Script Post-scanning.
5712Initiating NSE at 18:25
5713Completed NSE at 18:25, 0.00s elapsed
5714Initiating NSE at 18:25
5715Completed NSE at 18:25, 0.00s elapsed
5716#####################################################################################################################################
5717Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-24 18:25 EDT
5718NSE: Loaded 47 scripts for scanning.
5719NSE: Script Pre-scanning.
5720Initiating NSE at 18:25
5721Completed NSE at 18:25, 0.00s elapsed
5722Initiating NSE at 18:25
5723Completed NSE at 18:25, 0.00s elapsed
5724Initiating Parallel DNS resolution of 1 host. at 18:25
5725Completed Parallel DNS resolution of 1 host. at 18:25, 0.02s elapsed
5726Initiating UDP Scan at 18:25
5727Scanning ip-160-153-136-3.ip.secureserver.net (160.153.136.3) [15 ports]
5728Completed UDP Scan at 18:25, 4.21s elapsed (15 total ports)
5729Initiating Service scan at 18:25
5730Scanning 13 services on ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
5731Service scan Timing: About 7.69% done; ETC: 18:46 (0:19:36 remaining)
5732Completed Service scan at 18:27, 102.58s elapsed (13 services on 1 host)
5733Initiating OS detection (try #1) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
5734Retrying OS detection (try #2) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
5735Initiating Traceroute at 18:27
5736Completed Traceroute at 18:27, 7.13s elapsed
5737Initiating Parallel DNS resolution of 1 host. at 18:27
5738Completed Parallel DNS resolution of 1 host. at 18:27, 0.00s elapsed
5739NSE: Script scanning 160.153.136.3.
5740Initiating NSE at 18:27
5741Completed NSE at 18:27, 7.12s elapsed
5742Initiating NSE at 18:27
5743Completed NSE at 18:27, 1.12s elapsed
5744Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
5745Host is up (0.19s latency).
5746
5747PORT STATE SERVICE VERSION
574853/udp open|filtered domain
574967/udp open|filtered dhcps
575068/udp open|filtered dhcpc
575169/udp open|filtered tftp
575288/udp open|filtered kerberos-sec
5753123/udp open|filtered ntp
5754137/udp filtered netbios-ns
5755138/udp filtered netbios-dgm
5756139/udp open|filtered netbios-ssn
5757161/udp open|filtered snmp
5758162/udp open|filtered snmptrap
5759389/udp open|filtered ldap
5760500/udp open|filtered isakmp
5761|_ike-version: ERROR: Script execution failed (use -d to debug)
5762520/udp open|filtered route
57632049/udp open|filtered nfs
5764Too many fingerprints match this host to give specific OS details
5765
5766TRACEROUTE (using port 138/udp)
5767HOP RTT ADDRESS
57681 100.76 ms 10.245.204.1
57692 ... 3
57704 100.81 ms 10.245.204.1
57715 724.17 ms 10.245.204.1
57726 724.17 ms 10.245.204.1
57737 724.17 ms 10.245.204.1
57748 724.15 ms 10.245.204.1
57759 622.66 ms 10.245.204.1
577610 100.39 ms 10.245.204.1
577711 ... 18
577819 100.88 ms 10.245.204.1
577920 104.87 ms 10.245.204.1
578021 ... 27
578128 100.82 ms 10.245.204.1
578229 ...
578330 100.87 ms 10.245.204.1
5784
5785NSE: Script Post-scanning.
5786Initiating NSE at 18:27
5787Completed NSE at 18:27, 0.00s elapsed
5788Initiating NSE at 18:27
5789Completed NSE at 18:27, 0.00s elapsed
5790#####################################################################################################################################
5791Hosts
5792=====
5793
5794address mac name os_name os_flavor os_sp purpose info comments
5795------- --- ---- ------- --------- ----- ------- ---- --------
5796160.153.136.3 ip-160-153-136-3.ip.secureserver.net Linux 2.6.X server
5797
5798Services
5799========
5800
5801host port proto name state info
5802---- ---- ----- ---- ----- ----
5803160.153.136.3 25 tcp smtp closed
5804160.153.136.3 53 udp domain unknown
5805160.153.136.3 67 udp dhcps unknown
5806160.153.136.3 68 udp dhcpc unknown
5807160.153.136.3 69 udp tftp unknown
5808160.153.136.3 80 tcp http open Samsung AllShare httpd
5809160.153.136.3 88 udp kerberos-sec unknown
5810160.153.136.3 123 udp ntp unknown
5811160.153.136.3 137 udp netbios-ns filtered
5812160.153.136.3 138 udp netbios-dgm filtered
5813160.153.136.3 139 tcp netbios-ssn closed
5814160.153.136.3 139 udp netbios-ssn unknown
5815160.153.136.3 161 udp snmp unknown
5816160.153.136.3 162 udp snmptrap unknown
5817160.153.136.3 389 udp ldap unknown
5818160.153.136.3 443 tcp ssl/http open Samsung AllShare httpd
5819160.153.136.3 445 tcp microsoft-ds closed
5820160.153.136.3 500 udp isakmp unknown
5821160.153.136.3 520 udp route unknown
5822160.153.136.3 2049 udp nfs unknown
5823#######################################################################################################################################
5824 Anonymous JTSEC #OpDomesticTerrorism Full Recon #12