154.91.86.41

Regular View Raw Data
Last Seen: 2024-05-10

GeneralInformation

Country Hong Kong
City Hong Kong
Organization Tcloudnet, Inc
ISP Tcloudnet
ASN AS399077

WebTechnologies

Font scripts
JavaScript libraries
Miscellaneous
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-5332 Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.
CVE-2023-0845 Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5.
CVE-2022-40716 HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."
CVE-2022-29153 5.0HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
CVE-2021-38698 4.0HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2.
CVE-2021-37219 6.5HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.
CVE-2021-3121 7.5An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.
CVE-2020-7219 5.0HashiCorp Consul and Consul Enterprise up to 1.6.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 1.6.3.
CVE-2020-25864 4.3HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14.
CVE-2020-23064 Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the <options> element.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2018-19653 4.3HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the verify_outgoing setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade.
-169600884 | 2024-05-04T00:54:42.992523
  
80 / tcp
-1345205424 | 2024-05-08T18:14:35.587524
  
111 / tcp
-1345205424 | 2024-04-26T16:02:33.737513
  
111 / udp
-169600884 | 2024-05-08T08:55:46.432726
  
443 / tcp
-1675418583 | 2024-05-10T15:27:47.482794
  
4000 / tcp
-169600884 | 2024-05-01T12:15:28.105795
  
5000 / tcp
2115293072 | 2024-05-02T22:38:17.351460
  
5010 / tcp
731197476 | 2024-05-09T10:14:27.483749
  
6000 / tcp
-1927723706 | 2024-05-02T13:15:46.494662
  
6379 / tcp
70595672 | 2024-05-01T21:08:55.890909
  
6443 / tcp
110553246 | 2024-04-30T11:13:42.380559
  
8080 / tcp
-429034667 | 2024-05-04T08:33:33.415790
  
8090 / tcp
-714198678 | 2024-05-03T16:40:53.291148
  
8139 / tcp
1089222619 | 2024-05-06T11:30:05.416209
  
8140 / tcp
-1849886295 | 2024-05-02T05:56:38.228626
  
8180 / tcp
960949204 | 2024-05-07T07:10:48.941299
  
8181 / tcp
-2051616885 | 2024-05-09T22:12:27.755919
  
8500 / tcp
-816646372 | 2024-04-20T16:13:43.952966
  
9088 / tcp
1009235027 | 2024-05-08T20:54:50.489842
  
9090 / tcp
-5417634 | 2024-04-23T15:37:58.575633
  
9091 / tcp
731197476 | 2024-04-28T05:36:50.179878
  
9094 / tcp
-1675418583 | 2024-05-09T12:57:15.152752
  
9100 / tcp
-1714804253 | 2024-04-17T21:56:55.906744
  
9111 / tcp
-1849886295 | 2024-05-08T04:17:48.240157
  
9200 / tcp
-1849886295 | 2024-05-10T02:44:37.049644
  
9203 / tcp
731197476 | 2024-04-27T01:34:13.905545
  
9876 / tcp
-1210898882 | 2024-05-04T04:02:59.644795
  
27017 / tcp
-244165952 | 2024-05-04T22:37:17.703934
  
28015 / tcp



Contact Us

Shodan ® - All rights reserved