150.107.72.148

Regular View Raw Data
Last Seen: 2024-04-19
Tags:
starttls

GeneralInformation

Hostnames aaaba.com.au
www.aaaba.com.au
gnschassis.com.au
mail.gnschassis.com.au
www.gnschassis.com.au
vps1.webrenovation.com.au
Domains aaaba.com.au gnschassis.com.au webrenovation.com.au 
Country Australia
City Sydney
Organization Mammoth Media Pty Ltd
ISP Mammoth Media Pty Ltd
ASN AS133159

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-0586 The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Contributor+ role to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2023-0585 The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Administrator role or above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2022-42494 Server Side Request Forgery (SSRF) vulnerability in All in One SEO Pro plugin <= 4.2.5.1 on WordPress.
CVE-2022-38093 Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in All in One SEO plugin <= 4.2.3.1 at WordPress.
CVE-2021-25037 4.0The All in One SEO WordPress plugin before 4.1.5.3 is affected by an authenticated SQL injection issue, which was discovered during an internal audit by the Jetpack Scan team, and could grant attackers access to privileged information from the affected site’s database (e.g., usernames and hashed passwords).
CVE-2021-25036 6.5The All in One SEO WordPress plugin before 4.1.5.3 is affected by a Privilege Escalation issue, which was discovered during an internal audit by the Jetpack Scan team, and may grant bad actors access to protected REST API endpoints they shouldn’t have access to. This could ultimately enable users with low-privileged accounts, like subscribers, to perform remote code execution on affected sites.
CVE-2021-24307 9.0The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with "aioseo_tools_settings" privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section "Tool > Import/Export". However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution.
-2022843739 | 2024-04-13T10:25:08.111792
  
21 / tcp
710855913 | 2024-04-14T02:33:52.793059
  
53 / udp
-69281569 | 2024-04-17T14:41:15.208949
  
80 / tcp
1952082069 | 2024-03-25T05:55:30.561832
  
110 / tcp
-514976060 | 2024-04-19T00:02:16.547750
  
443 / tcp
-2034242934 | 2024-04-12T12:06:21.397593
  
465 / tcp
-1132241830 | 2024-04-14T07:45:23.618311
  
993 / tcp
-1001764030 | 2024-04-17T07:55:39.978334
  
995 / tcp
-1315405412 | 2024-04-16T21:48:28.468113
  
2082 / tcp
-1945122027 | 2024-04-18T04:18:35.601054
  
2083 / tcp
391356518 | 2024-04-09T18:08:37.897342
  
2086 / tcp
787990471 | 2024-04-11T11:41:54.467988
  
2087 / tcp
-1245116553 | 2024-04-16T21:33:49.295634
  
2095 / tcp



Contact Us

Shodan ® - All rights reserved