45.60.38.239

Regular View Raw Data
Last Seen: 2024-05-17
Tags:
cdn

GeneralInformation

Hostnames accessfr.com
apreciare.com
www.apreciare.com
aroundmexico.mx
www.aroundmexico.mx
corpo-rate.com
www.corpo-rate.com
dayforia.com
e-kash.com.mx
www.e-kash.com.mx
ekashdollar.com
www.ekashdollar.com
enjoymexico.club
www.enjoymexico.club
enjoyvacation.club
fa-vacationclub.com
favc.com
access.favc.com
vacaciones.favc.com
ventas.favc.com
www.favc.com
fiestainn.com
fiestamericanaweddings.com
www.fiestamericanaweddings.com
fiestarewards.com
igstst.fiestarewards.com
wsexternal.fiestarewards.com
fundacionposadas.org
gammahoteles.com
grandfiestamericana.com
payment.holabye.com
imperva.com
kivac.com.mx
liveaqua.com
liveaquaresidenceclub.com
motivatuventa.com
www.motivatuventa.com
onehoteles.com
posadas.com
bi.posadas.com
cms.posadas.com
directorio.posadas.com
odin.posadas.com
reservations.posadas.com
secure.posadas.com
secure-test.posadas.com
transfer.posadas.com
re-set.mx
www.re-set.mx
roundtrip2x1.com
therates.mx
travelsuite.mx
www.travelsuite.mx
viajaplus.mx
viajasiempre.mx
Domains accessfr.com apreciare.com aroundmexico.mx corpo-rate.com dayforia.com e-kash.com.mx ekashdollar.com enjoymexico.club enjoyvacation.club fa-vacationclub.com favc.com fiestainn.com fiestamericanaweddings.com fiestarewards.com fundacionposadas.org gammahoteles.com grandfiestamericana.com holabye.com imperva.com kivac.com.mx liveaqua.com liveaquaresidenceclub.com motivatuventa.com onehoteles.com posadas.com re-set.mx roundtrip2x1.com therates.mx travelsuite.mx viajaplus.mx viajasiempre.mx 
Country United States
City Los Angeles
Organization Incapsula Inc
ISP Incapsula Inc
ASN AS19551

WebTechnologies

JavaScript libraries
Security

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2024-0727 Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
CVE-2023-6129 Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However unless the compiler uses the vector registers for storing pointers, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3. If this cipher is enabled on the server a malicious client can influence whether this AEAD cipher is used. This implies that TLS server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue.
CVE-2023-5678 Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
CVE-2023-5363 Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.
CVE-2019-0190 5.0A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts.
CVE-2009-3767 4.3libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2009-3766 6.8mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CVE-2009-3765 6.8mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVE-2009-1390 6.8Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack.
645808996 | 2024-05-15T02:13:34.208187
  
25 / tcp
1550767867 | 2024-05-13T00:29:04.631825
  
43 / tcp
1693880037 | 2024-05-17T04:40:14.759715
  
80 / tcp
390383389 | 2024-05-15T16:06:34.602663
  
81 / tcp
550050070 | 2024-05-14T17:07:12.200939
  
82 / tcp
-1149141941 | 2024-05-10T05:46:13.503610
  
83 / tcp
-2134372782 | 2024-05-12T14:48:46.561531
  
84 / tcp
1055979987 | 2024-05-17T09:34:21.167562
  
88 / tcp
-619489756 | 2024-05-10T11:05:16.529097
  
389 / tcp
-1673410543 | 2024-05-17T13:19:33.093664
  
443 / tcp
-937237982 | 2024-05-12T14:39:14.583623
  
444 / tcp
-361470890 | 2024-05-16T20:20:38.195132
  
465 / tcp
-1577693299 | 2024-05-13T07:07:19.850123
  
554 / tcp
-1900037264 | 2024-05-13T02:35:19.020511
  
587 / tcp
2009560413 | 2024-05-09T17:04:25.642686
  
631 / tcp
1335765193 | 2024-04-27T13:31:47.581833
  
636 / tcp
-1616051217 | 2024-05-16T00:06:43.191223
  
1024 / tcp
1926241428 | 2024-05-16T11:18:52.226852
  
1177 / tcp
-60008471 | 2024-05-11T04:43:21.249218
  
1234 / tcp
214894188 | 2024-05-15T14:57:42.218339
  
1337 / tcp
792648997 | 2024-05-10T06:48:47.883277
  
1400 / tcp
1527048356 | 2024-05-12T18:37:17.393905
  
1433 / tcp
-191966457 | 2024-05-10T03:45:39.666383
  
1521 / tcp
152190512 | 2024-05-17T08:31:23.805406
  
1935 / tcp
-1108939099 | 2024-04-27T19:12:18.714416
  
2000 / tcp
-1587478311 | 2024-05-16T07:16:46.669957
  
2082 / tcp
-421169027 | 2024-04-26T11:35:38.208573
  
2083 / tcp
-761215108 | 2024-05-10T09:47:24.843178
  
2086 / tcp
-1587098028 | 2024-05-14T16:38:23.472836
  
2087 / tcp
1094909453 | 2024-05-13T19:07:46.960388
  
2222 / tcp
501962331 | 2024-05-16T11:51:30.766236
  
2290 / tcp
-1184869805 | 2024-04-21T13:42:54.338002
  
2345 / tcp
663203759 | 2024-05-12T11:03:35.051223
  
2375 / tcp
-842774017 | 2024-05-16T13:33:55.745704
  
2376 / tcp
1202484745 | 2024-05-14T23:40:21.942630
  
2404 / tcp
1232243465 | 2024-05-11T16:05:21.523793
  
2480 / tcp
103212106 | 2024-04-30T04:29:35.293470
  
2628 / tcp
1637889934 | 2024-05-16T20:46:58.654379
  
2761 / tcp
-623969077 | 2024-04-22T18:46:29.365744
  
2762 / tcp
-1351617689 | 2024-05-12T10:55:42.183152
  
3000 / tcp
-902025899 | 2024-05-15T02:28:56.714325
  
3001 / tcp
2106347475 | 2024-05-08T15:34:52.408665
  
3050 / tcp
-1345327593 | 2024-05-13T20:41:54.642934
  
3268 / tcp
1095294028 | 2024-05-12T15:35:05.488575
  
3269 / tcp
-568258075 | 2024-05-10T22:25:37.312760
  
3333 / tcp
537582887 | 2024-05-17T11:13:36.089878
  
3389 / tcp
1914979834 | 2024-05-13T10:58:21.293881
  
3790 / tcp
2022622245 | 2024-05-15T13:03:49.675072
  
4000 / tcp
1427425686 | 2024-05-07T21:24:54.983197
  
4022 / tcp
-239874496 | 2024-05-11T21:39:49.511658
  
4040 / tcp
0 | 2024-05-11T03:19:23.049119
  
4064 / tcp
1049234944 | 2024-05-09T14:17:42.350753
  
4443 / tcp
-1467015954 | 2024-05-02T20:32:58.665577
  
4444 / tcp
-995816962 | 2024-05-16T09:58:35.858837
  
4451 / tcp
1999676028 | 2024-04-25T01:29:38.590948
  
4500 / tcp
-1028107604 | 2024-05-07T01:37:28.489334
  
4567 / tcp
-546338352 | 2024-05-16T21:17:11.059800
  
4911 / tcp
-2111832469 | 2024-05-12T23:24:01.734243
  
5000 / tcp
-923596075 | 2024-05-11T21:38:50.966313
  
5001 / tcp
-1550384919 | 2024-05-09T03:31:35.734007
  
5005 / tcp
1461722875 | 2024-05-13T12:08:14.659040
  
5006 / tcp
945448568 | 2024-04-17T16:05:18.208201
  
5007 / tcp
1658263527 | 2024-05-05T04:14:22.142073
  
5009 / tcp
-746153897 | 2024-04-26T02:24:19.880985
  
5010 / tcp
688974659 | 2024-05-01T15:23:02.164920
  
5201 / tcp
-1288189937 | 2024-05-15T04:49:04.409256
  
5222 / tcp
-1383061142 | 2024-05-10T03:41:19.470591
  
5555 / tcp
-1233680547 | 2024-04-30T12:07:27.651332
  
5560 / tcp
534293634 | 2024-05-09T08:20:43.061027
  
5601 / tcp
1307927347 | 2024-04-28T10:25:12.304356
  
5672 / tcp
1828112624 | 2024-05-15T23:56:51.387290
  
5900 / tcp
-1723495380 | 2024-05-02T14:17:54.476914
  
5986 / tcp
578305427 | 2024-04-30T02:50:45.875576
  
6000 / tcp
1732355108 | 2024-05-13T16:00:11.077336
  
6001 / tcp
-676061076 | 2024-04-30T01:02:09.311336
  
6080 / tcp
609678326 | 2024-04-26T23:36:59.531021
  
6443 / tcp
-614192512 | 2024-05-06T11:26:19.097868
  
7001 / tcp
1189378367 | 2024-05-07T15:41:22.023076
  
7071 / tcp
267726296 | 2024-05-10T07:34:41.159400
  
7443 / tcp
-917735556 | 2024-05-12T02:40:55.235283
  
7474 / tcp
-1076879752 | 2024-05-12T11:08:07.129789
  
7547 / tcp
257608337 | 2024-05-07T04:01:44.671575
  
7548 / tcp
375647914 | 2024-05-14T17:20:34.311319
  
7777 / tcp
-739400415 | 2024-05-16T06:03:08.922798
  
7779 / tcp
42512371 | 2024-05-13T09:55:07.764206
  
8000 / tcp
737947277 | 2024-05-08T06:50:35.362768
  
8001 / tcp
-2038904527 | 2024-05-09T05:26:28.604759
  
8008 / tcp
91809013 | 2024-05-14T09:26:34.448570
  
8009 / tcp
-261072565 | 2024-05-16T03:26:26.723572
  
8010 / tcp
-547315525 | 2024-05-16T18:28:02.442865
  
8060 / tcp
588064262 | 2024-05-13T05:40:51.219504
  
8069 / tcp
1618885932 | 2024-05-14T01:04:35.216248
  
8080 / tcp
-2062139731 | 2024-05-15T06:02:19.208635
  
8081 / tcp
1909684182 | 2024-05-02T22:43:22.436753
  
8082 / tcp
-234904533 | 2024-05-12T09:02:48.169626
  
8083 / tcp
-1219005698 | 2024-04-25T09:08:28.759772
  
8085 / tcp
925661716 | 2024-05-07T15:56:13.736134
  
8086 / tcp
-889862966 | 2024-05-11T21:12:31.194457
  
8089 / tcp
-1204492867 | 2024-05-11T19:57:35.349604
  
8090 / tcp
718603502 | 2024-05-05T07:06:11.160848
  
8098 / tcp
-26955068 | 2024-05-10T12:02:55.214555
  
8112 / tcp
-821343885 | 2024-05-13T21:05:36.078035
  
8123 / tcp
-1810665001 | 2024-05-05T05:54:33.347613
  
8126 / tcp
2057807340 | 2024-05-13T10:13:15.521376
  
8139 / tcp
1344556801 | 2024-04-29T21:32:09.260751
  
8140 / tcp
-792918352 | 2024-05-13T06:51:33.233340
  
8181 / tcp
-1268319849 | 2024-05-04T10:08:01.670363
  
8200 / tcp
1258820611 | 2024-05-15T14:03:58.575609
  
8443 / tcp
1970971807 | 2024-05-06T05:58:35.226288
  
8800 / tcp
-2124740712 | 2024-05-13T11:09:09.996369
  
8834 / tcp
1509571796 | 2024-05-13T10:03:49.663814
  
8880 / tcp
-2133376371 | 2024-05-13T03:21:57.805989
  
8888 / tcp
-1886020994 | 2024-05-04T04:13:10.092149
  
8889 / tcp
-1884079209 | 2024-05-08T17:49:58.659547
  
9000 / tcp
1653754808 | 2024-04-24T09:46:50.454243
  
9001 / tcp
29437400 | 2024-05-16T10:04:39.591558
  
9002 / tcp
263630003 | 2024-05-12T09:07:45.600897
  
9009 / tcp
-1922545428 | 2024-05-04T17:56:46.516322
  
9080 / tcp
-1176189245 | 2024-04-24T09:28:33.377389
  
9090 / tcp
-174793239 | 2024-04-24T13:26:34.100724
  
9091 / tcp
-2083683319 | 2024-04-26T17:54:57.959753
  
9095 / tcp
-938757020 | 2024-05-05T13:06:19.046399
  
9100 / tcp
-2013286753 | 2024-05-16T06:30:46.348916
  
9200 / tcp
1929554416 | 2024-05-14T12:07:20.624092
  
9306 / tcp
219668819 | 2024-05-08T12:53:12.482102
  
9443 / tcp
-594307854 | 2024-05-17T06:51:10.746914
  
9876 / tcp
799407915 | 2024-04-29T02:41:15.544667
  
9943 / tcp
1091416840 | 2024-05-02T17:39:11.756239
  
9998 / tcp
-1406291828 | 2024-05-17T08:45:50.221962
  
9999 / tcp
-1478294829 | 2024-05-08T09:36:38.342415
  
10000 / tcp
-2144250589 | 2024-05-07T10:58:49.412700
  
10001 / tcp
-2067028711 | 2024-05-11T19:02:08.542401
  
10134 / tcp
-1373236989 | 2024-05-08T10:27:12.472406
  
10443 / tcp
-1797841912 | 2024-05-13T05:56:25.123747
  
12345 / tcp
-1799950596 | 2024-04-18T16:59:28.101935
  
13579 / tcp
-54081746 | 2024-05-08T19:33:06.609353
  
14265 / tcp
827758958 | 2024-05-16T06:42:54.602965
  
16010 / tcp
1446525850 | 2024-05-10T13:37:06.172463
  
16030 / tcp
-2126640271 | 2024-05-13T20:34:09.236473
  
20000 / tcp
458713815 | 2024-04-25T11:18:23.621325
  
31337 / tcp
582308396 | 2024-05-06T23:07:00.731593
  
50000 / tcp
-1037402920 | 2024-04-22T19:11:41.690311
  
55000 / tcp
778028789 | 2024-04-20T01:20:31.037937
  
55443 / tcp
-1874833619 | 2024-05-16T12:14:19.698165
  
60001 / tcp



Contact Us

Shodan ® - All rights reserved