142.4.14.142

Regular View Raw Data
Last Seen: 2024-04-24

GeneralInformation

Hostnames umacleveland.org
mail.umacleveland.org
server.umacleveland.org
cpanel.server.umacleveland.org
cpcalendars.server.umacleveland.org
cpcontacts.server.umacleveland.org
mail.server.umacleveland.org
webmail.server.umacleveland.org
whm.server.umacleveland.org
www.server.umacleveland.org
www.umacleveland.org
Domains umacleveland.org 
Country United States
City Provo
Organization Unified Layer
ISP Unified Layer
ASN AS46606

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-0586 The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Contributor+ role to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2023-0585 The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Administrator role or above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2022-42494 Server Side Request Forgery (SSRF) vulnerability in All in One SEO Pro plugin <= 4.2.5.1 on WordPress.
CVE-2022-38093 Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in All in One SEO plugin <= 4.2.3.1 at WordPress.
CVE-2021-25037 4.0The All in One SEO WordPress plugin before 4.1.5.3 is affected by an authenticated SQL injection issue, which was discovered during an internal audit by the Jetpack Scan team, and could grant attackers access to privileged information from the affected site’s database (e.g., usernames and hashed passwords).
CVE-2021-25036 6.5The All in One SEO WordPress plugin before 4.1.5.3 is affected by a Privilege Escalation issue, which was discovered during an internal audit by the Jetpack Scan team, and may grant bad actors access to protected REST API endpoints they shouldn’t have access to. This could ultimately enable users with low-privileged accounts, like subscribers, to perform remote code execution on affected sites.
CVE-2021-24307 9.0The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with "aioseo_tools_settings" privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section "Tool > Import/Export". However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution.
-1129480075 | 2024-04-14T00:23:01.594307
  
21 / tcp
1504202152 | 2024-04-20T16:53:55.165269
  
26 / tcp
1864089889 | 2024-04-23T16:32:07.926755
  
53 / tcp
1864089889 | 2024-04-24T05:42:48.585223
  
53 / udp
-36013205 | 2024-04-15T06:35:44.901086
  
80 / tcp
1952082069 | 2024-04-15T23:04:04.844129
  
110 / tcp
-1345205424 | 2024-04-14T03:43:39.923609
  
111 / tcp
-1345205424 | 2024-04-22T19:20:52.867420
  
111 / udp
1559185454 | 2024-04-23T17:25:03.322812
  
143 / tcp
-1661613756 | 2024-04-23T04:53:23.883188
  
443 / tcp
1052952929 | 2024-04-22T17:06:33.583601
  
465 / tcp
-1371257949 | 2024-04-17T18:08:10.074494
  
587 / tcp
-1132241830 | 2024-04-10T13:01:10.067342
  
993 / tcp
-1001764030 | 2024-04-23T11:19:45.718082
  
995 / tcp
-55923589 | 2024-04-24T02:58:56.664499
  
2077 / tcp
-1076364646 | 2024-04-16T05:27:44.487028
  
2082 / tcp
1443717563 | 2024-04-16T05:27:45.806434
  
2083 / tcp
-448409821 | 2024-04-23T04:53:18.583190
  
2086 / tcp
-200868415 | 2024-04-23T04:53:19.934638
  
2087 / tcp
-96294589 | 2024-04-16T19:30:59.386759
  
3306 / tcp



Contact Us

Shodan ® - All rights reserved