120.79.94.168

Regular View Raw Data
Last Seen: 2024-05-31

GeneralInformation

Country China
City Shenzhen
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

WebTechnologies

JavaScript frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-37582 The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.
CVE-2023-33246 9.8RocketMQ versions 5.1.0 and below are vulnerable to Arbitrary Code Injection
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 6.8A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
-2043408877 | 2024-05-31T16:08:07.018440
  
22 / tcp
1651973090 | 2024-05-27T03:14:49.274882
  
80 / tcp
2136410179 | 2024-05-25T15:50:03.293301
  
3306 / tcp
-1927723706 | 2024-05-22T23:14:35.014215
  
6379 / tcp
1196646144 | 2024-05-27T08:16:46.769702
  
8085 / tcp
862408204 | 2024-05-28T22:07:07.230177
  
8090 / tcp
335330650 | 2024-05-16T21:39:00.046348
  
8098 / tcp
-653857173 | 2024-05-29T02:22:40.746076
  
9876 / tcp
0 | 2024-05-24T04:07:17.184272
  
10909 / tcp
0 | 2024-05-15T15:11:07.575835
  
10911 / tcp



Contact Us

Shodan ® - All rights reserved