34.116.145.235

Regular View Raw Data
Last Seen: 2024-04-29

GeneralInformation

Hostnames 235.145.116.34.bc.googleusercontent.com
Domains googleusercontent.com 
Cloud Provider Google
Cloud Region europe-central2
Country Poland
City Warsaw
Organization Google LLC
ISP Google LLC
ASN AS396982

WebTechnologies

JavaScript frameworks
Programming languages
Web frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2021-21285 4.3In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
CVE-2021-21284 2.7In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
CVE-2020-27534 5.0util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call.
CVE-2019-16884 5.0runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
CVE-2019-13509 5.0In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
616486888 | 2024-04-29T11:29:38.481271
  
22 / tcp
-1369061417 | 2024-04-24T02:54:40.171829
  
23 / tcp
-1576813820 | 2024-04-29T10:30:31.200266
  
25 / tcp
-2053687298 | 2024-04-29T16:01:12.239691
  
80 / tcp
-1371444028 | 2024-04-29T16:30:57.739676
  
81 / tcp
-1371444028 | 2024-04-29T08:13:00.305822
  
82 / tcp
1561587376 | 2024-04-29T08:44:34.317533
  
2375 / tcp
-1371444028 | 2024-04-29T17:24:38.523589
  
5985 / tcp
35672712 | 2024-04-29T17:18:04.879289
  
5986 / tcp
-2053687298 | 2024-04-29T19:05:43.736702
  
8000 / tcp
-2053687298 | 2024-04-29T14:27:09.630727
  
8080 / tcp
35672712 | 2024-04-29T14:30:37.358573
  
8081 / tcp
-1371444028 | 2024-04-29T19:07:35.779058
  
8090 / tcp
-2053687298 | 2024-04-29T12:51:59.030463
  
8888 / tcp
-1371444028 | 2024-04-29T12:46:24.982047
  
9090 / tcp
35672712 | 2024-04-29T19:43:04.251147
  
10000 / tcp



Contact Us

Shodan ® - All rights reserved