47.113.221.46

Regular View Raw Data

GeneralInformation

Country China
City Heyuan
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

WebTechnologies

JavaScript graphics
Network storage
Operating systems
Programming languages
Search engines
UI frameworks
Web frameworks
Web server extensions

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

OpenPorts

111315171921222325263743495370798081828384878897102104110111113119135143161175179195199221264311389427443444465502503515548554587593631636666771789830843873902992993995999102310241025102610991153116712001234129013111337140014141433147115211588159916041723174118801883191119251926193519511962200020022008201020212052206320672081208220832086208720962121212621502154218122202221222222452259232323322345237523762379240424552556255825682761276230003001305030603071308730933094309931013109311431173120312832003260326832693299330133063310338833893406340834103524354135423551355735583567368937313749378037903794395040004010402240404043406340644242428243214369443344344443448245004506456746644747478247864808484048484899491149495000500550065007500950105025509051725201522252695357543254355500556055955597560156975800580158585900590159085938598459855986600060016002600460806161637964436510662266336653666466666667666866976748699870017002707171717218731674347443744574747493754775487557763476547657770077777778777979897998800080018002800480088009801080268031804480468053806080698080808180858086808780898090809680988099810081038110811281238126813981408143818181888200829183338334840484098416842484288443844485008545855485758649866687288733876687678789880088048807881288138814882188298834883688438848885188558856886288748880888588888889899990009001900290099013901690319042904890509051908090899090909190929095909691009110915191609191919992009207920992169218929593029303930693089398941894439444953095959600966397359761976598009869987699439944996699819988999299989999100001000110073101431024310250104431055410909109111100011112112101121111300113711143412000122351234513579141471426516010160301628516992169931700018080180811824518553190001907120000202562054721025210272137922000220012206722070225562302323424250012510525565266562701528000280152801730002300033030331337314013144332400327643306033445350003721537777383333927741800423984311844158448184799049152500005005050070501005071951106512355231152869534135413854321543615500055442554435555355554600016001060030605676161361616620786220063210
-98713449 | 2024-09-14T10:47:25.835509
  
11 / tcp
-98713449 | 2024-09-14T09:39:28.556071
  
13 / tcp
-98713449 | 2024-09-14T09:16:37.892346
  
15 / tcp
-2031469209 | 2024-09-14T09:40:28.115539
  
17 / tcp
-2031469209 | 2024-09-14T09:08:12.819358
  
19 / tcp
1749926860 | 2024-09-14T02:43:10.847367
  
21 / tcp
1103093247 | 2024-09-14T10:32:43.455999
  
22 / tcp
-562593778 | 2024-09-14T10:28:56.937202
  
23 / tcp
786525225 | 2024-09-14T10:29:24.175584
  
25 / tcp
872027731 | 2024-09-14T05:23:35.568949
  
26 / tcp
-2031469209 | 2024-09-13T21:22:15.935574
  
37 / tcp
-98713449 | 2024-09-14T06:57:04.349002
  
43 / tcp
-2031469209 | 2024-09-14T09:28:24.095340
  
49 / tcp
-98713449 | 2024-09-14T06:00:48.455161
  
53 / tcp
-2031469209 | 2024-09-14T05:45:39.330270
  
70 / tcp
-98713449 | 2024-09-14T09:39:50.582835
  
79 / tcp
-771463154 | 2024-09-13T16:07:50.994238
  
80 / tcp
-1805871619 | 2024-09-14T08:26:11.276435
  
81 / tcp
-207704745 | 2024-09-14T10:09:06.862720
  
82 / tcp
-207704745 | 2024-09-14T08:43:35.301548
  
83 / tcp
633775022 | 2024-09-14T10:32:32.620476
  
84 / tcp
841181021 | 2024-09-05T22:55:46.459304
  
87 / tcp
-488469797 | 2024-09-14T11:09:37.417237
  
88 / tcp
-98713449 | 2024-09-07T21:36:06.037927
  
97 / tcp
-1091575315 | 2024-09-14T10:14:32.108000
  
102 / tcp
-98713449 | 2024-09-14T11:44:29.486233
  
104 / tcp
-776469200 | 2024-09-14T07:41:48.170177
  
110 / tcp
-98713449 | 2024-09-14T04:03:22.537414
  
111 / tcp
-98713449 | 2024-09-14T08:27:28.708747
  
113 / tcp
-98713449 | 2024-09-14T07:18:54.304860
  
119 / tcp
-2031469209 | 2024-09-04T22:42:48.124187
  
135 / tcp
-1687578356 | 2024-09-14T08:06:46.507618
  
143 / tcp
-289893565 | 2024-09-14T09:13:01.874290
  
161 / udp
-98713449 | 2024-09-14T06:20:09.036373
  
175 / tcp
-2031469209 | 2024-09-14T09:38:22.926121
  
179 / tcp
-98713449 | 2024-09-14T06:25:05.317623
  
195 / tcp
-2031469209 | 2024-09-11T02:06:49.243872
  
199 / tcp
-98713449 | 2024-09-14T09:00:40.817983
  
221 / tcp
-2031469209 | 2024-09-14T05:28:47.131792
  
264 / tcp
411540654 | 2024-09-14T10:45:53.853249
  
311 / tcp
-98713449 | 2024-09-14T03:08:07.605701
  
389 / tcp
-1453395553 | 2024-09-14T09:15:17.796943
  
427 / tcp
-771463154 | 2024-09-14T07:34:47.200012
  
443 / tcp
-771463154 | 2024-09-14T07:45:11.275196
  
444 / tcp
-98713449 | 2024-09-14T07:54:58.794797
  
465 / tcp
-236382233 | 2024-09-14T06:14:29.319715
  
502 / tcp
-98713449 | 2024-09-14T05:25:28.312865
  
503 / tcp
-2031469209 | 2024-09-14T05:13:33.234378
  
515 / tcp
-2031469209 | 2024-09-14T08:07:46.702118
  
548 / tcp
-98713449 | 2024-09-14T04:29:56.189029
  
554 / tcp
-2031469209 | 2024-09-14T03:56:30.367216
  
587 / tcp
-98713449 | 2024-09-14T03:53:28.106748
  
593 / tcp
998037014 | 2024-09-14T10:51:41.329041
  
631 / tcp
998037014 | 2024-09-14T04:53:59.479456
  
636 / tcp
-98713449 | 2024-09-14T11:42:05.289891
  
666 / tcp
-98713449 | 2024-09-14T07:57:48.521027
  
771 / tcp
-98713449 | 2024-09-14T11:31:08.562501
  
789 / tcp
-98713449 | 2024-09-12T21:33:10.952643
  
830 / tcp
-2031469209 | 2024-09-06T14:26:35.155031
  
843 / tcp
-98713449 | 2024-09-14T10:12:22.148133
  
873 / tcp
-98713449 | 2024-09-14T06:18:16.380212
  
902 / tcp
-2031469209 | 2024-09-14T10:19:41.293303
  
992 / tcp
-2031469209 | 2024-09-14T06:24:31.980481
  
993 / tcp
-98713449 | 2024-09-14T08:47:49.234240
  
995 / tcp
-2031469209 | 2024-09-08T18:38:59.808860
  
999 / tcp
-1465753460 | 2024-09-14T08:36:21.830996
  
1023 / tcp
-98713449 | 2024-09-14T08:23:27.909078
  
1024 / tcp
-2031469209 | 2024-09-14T04:26:41.553183
  
1025 / tcp
-98713449 | 2024-09-09T10:34:16.832396
  
1026 / tcp
1074147024 | 2024-09-14T08:19:46.031432
  
1099 / tcp
-98713449 | 2024-09-14T05:45:06.712479
  
1153 / tcp
-2031469209 | 2024-09-13T03:57:26.229280
  
1167 / tcp
-98713449 | 2024-09-14T10:15:32.846069
  
1200 / tcp
-1198227559 | 2024-09-14T09:29:26.223935
  
1234 / tcp
-98713449 | 2024-09-08T10:50:08.215612
  
1290 / tcp
-98713449 | 2024-09-14T09:33:44.679203
  
1311 / tcp
-399208871 | 2024-09-14T10:40:48.010737
  
1337 / tcp
-98713449 | 2024-09-14T11:28:38.335688
  
1400 / tcp
-2031469209 | 2024-09-01T01:18:18.877736
  
1414 / tcp
1772117000 | 2024-09-14T08:17:01.437533
  
1433 / tcp
-98713449 | 2024-09-14T08:48:04.222693
  
1471 / tcp
-2031469209 | 2024-09-14T06:35:49.917951
  
1521 / tcp
-98713449 | 2024-09-01T05:02:04.022081
  
1588 / tcp
-2031469209 | 2024-09-14T07:43:44.597142
  
1599 / tcp
-98713449 | 2024-09-14T05:53:14.413105
  
1604 / tcp
-98713449 | 2024-09-14T01:07:38.987450
  
1723 / tcp
-98713449 | 2024-09-14T05:29:30.386681
  
1741 / tcp
-2031469209 | 2024-08-22T19:41:40.962674
  
1880 / tcp
-98713449 | 2024-09-14T09:47:26.451920
  
1911 / tcp
-98713449 | 2024-09-14T09:26:44.217890
  
1925 / tcp
1094048410 | 2024-09-14T00:03:39.019019
  
1926 / tcp
-98713449 | 2024-09-14T11:47:33.499834
  
1935 / tcp
-98713449 | 2024-08-30T21:22:37.628332
  
1951 / tcp
-2031469209 | 2024-09-14T10:46:34.359603
  
1962 / tcp
-98713449 | 2024-09-13T15:19:08.516877
  
2000 / tcp
-2031469209 | 2024-09-14T09:59:01.019846
  
2002 / tcp
-98713449 | 2024-09-13T05:44:45.531564
  
2008 / tcp
-98713449 | 2024-08-29T11:09:35.512272
  
2010 / tcp
-98713449 | 2024-09-12T12:41:57.087832
  
2021 / tcp
-98713449 | 2024-09-10T22:43:29.316528
  
2052 / tcp
-98713449 | 2024-08-24T02:24:15.037775
  
2063 / tcp
-2031469209 | 2024-09-14T11:27:51.173737
  
2067 / tcp
-2031469209 | 2024-09-14T03:49:37.358767
  
2081 / tcp
-98713449 | 2024-09-14T09:32:39.518239
  
2082 / tcp
1094048410 | 2024-09-14T09:38:24.911702
  
2083 / tcp
-1475755397 | 2024-09-14T06:55:03.648610
  
2086 / tcp
-1475755397 | 2024-09-14T11:19:07.051022
  
2087 / tcp
-98713449 | 2024-08-30T00:28:09.577862
  
2096 / tcp
-2031469209 | 2024-09-13T22:19:47.402496
  
2121 / tcp
-2031469209 | 2024-08-17T01:11:05.423535
  
2126 / tcp
-98713449 | 2024-09-01T05:43:15.156075
  
2150 / tcp
-98713449 | 2024-09-14T06:45:25.327664
  
2154 / tcp
-2031469209 | 2024-09-14T02:01:13.200101
  
2181 / tcp
-2031469209 | 2024-09-03T13:28:58.929947
  
2220 / tcp
-2031469209 | 2024-08-23T12:17:13.818391
  
2221 / tcp
1905338547 | 2024-09-14T09:10:07.707779
  
2222 / tcp
-2031469209 | 2024-08-30T20:30:52.956979
  
2245 / tcp
-2031469209 | 2024-09-05T06:59:13.564287
  
2259 / tcp
-827631055 | 2024-09-14T06:37:54.517573
  
2323 / tcp
-98713449 | 2024-09-13T20:50:35.846601
  
2332 / tcp
-2031469209 | 2024-09-14T05:32:55.163079
  
2345 / tcp
-98713449 | 2024-09-14T07:29:20.925794
  
2375 / tcp
1094048410 | 2024-09-13T21:24:04.615993
  
2376 / tcp
-98713449 | 2024-09-14T10:17:34.072067
  
2379 / tcp
-1863726365 | 2024-09-13T20:48:37.436020
  
2404 / tcp
-98713449 | 2024-09-14T09:34:23.497195
  
2455 / tcp
-98713449 | 2024-08-30T15:18:34.271072
  
2556 / tcp
-98713449 | 2024-08-25T14:54:53.729089
  
2558 / tcp
-2031469209 | 2024-08-18T22:10:48.946683
  
2568 / tcp
-98713449 | 2024-09-14T07:03:35.155767
  
2761 / tcp
-2031469209 | 2024-09-14T09:10:48.715107
  
2762 / tcp
-291974457 | 2024-09-14T09:58:22.103860
  
3000 / tcp
-98713449 | 2024-09-14T11:05:04.461451
  
3001 / tcp
-98713449 | 2024-09-14T04:43:32.383297
  
3050 / tcp
-2031469209 | 2024-09-03T10:14:38.880402
  
3060 / tcp
-98713449 | 2024-08-16T23:15:20.878969
  
3071 / tcp
-98713449 | 2024-08-19T21:23:33.227675
  
3087 / tcp
-98713449 | 2024-08-17T13:05:37.362411
  
3093 / tcp
-98713449 | 2024-09-06T01:10:39.747592
  
3094 / tcp
-98713449 | 2024-09-02T07:50:40.787878
  
3099 / tcp
-98713449 | 2024-09-09T23:20:30.950281
  
3101 / tcp
-2031469209 | 2024-08-20T09:56:36.251329
  
3109 / tcp
-2031469209 | 2024-09-13T18:37:40.727272
  
3114 / tcp
-98713449 | 2024-08-29T12:32:12.948168
  
3117 / tcp
-98713449 | 2024-09-13T10:50:51.800736
  
3120 / tcp
-98713449 | 2024-09-14T11:01:22.357572
  
3128 / tcp
-98713449 | 2024-08-22T19:31:57.795885
  
3200 / tcp
-2031469209 | 2024-09-14T06:54:49.106360
  
3260 / tcp
-2031469209 | 2024-09-13T20:05:45.588968
  
3268 / tcp
-98713449 | 2024-09-14T11:02:34.684013
  
3269 / tcp
-2031469209 | 2024-09-14T10:18:39.426696
  
3299 / tcp
-2031469209 | 2024-09-13T19:53:59.979244
  
3301 / tcp
1731321488 | 2024-09-13T22:17:20.094570
  
3306 / tcp
-98713449 | 2024-09-13T16:37:21.512524
  
3310 / tcp
-2031469209 | 2024-09-14T09:52:04.812251
  
3388 / tcp
981973376 | 2024-09-13T04:46:15.295984
  
3389 / tcp
-98713449 | 2024-08-29T14:41:45.320239
  
3406 / tcp
-98713449 | 2024-09-01T13:57:56.284224
  
3408 / tcp
-98713449 | 2024-08-25T11:52:07.687658
  
3410 / tcp
-2031469209 | 2024-08-30T09:39:39.985816
  
3524 / tcp
-98713449 | 2024-09-14T09:20:37.057560
  
3541 / tcp
-98713449 | 2024-09-14T10:35:59.666318
  
3542 / tcp
-98713449 | 2024-09-14T06:19:18.682013
  
3551 / tcp
-98713449 | 2024-08-23T12:01:22.350583
  
3557 / tcp
-2031469209 | 2024-09-07T02:32:32.643236
  
3558 / tcp
-98713449 | 2024-08-27T21:34:15.794130
  
3567 / tcp
-98713449 | 2024-09-14T09:48:29.646295
  
3689 / tcp
-98713449 | 2024-08-15T19:08:53.208450
  
3731 / tcp
-2031469209 | 2024-09-14T11:17:49.909363
  
3749 / tcp
411540654 | 2024-09-14T08:41:52.159205
  
3780 / tcp
1094048410 | 2024-09-14T06:06:21.197286
  
3790 / tcp
-98713449 | 2024-09-04T12:52:18.652136
  
3794 / tcp
-2031469209 | 2024-09-04T16:08:40.530621
  
3950 / tcp
-2031469209 | 2024-09-14T05:47:26.019165
  
4000 / tcp
-2031469209 | 2024-08-20T06:20:09.703194
  
4010 / tcp
-597069886 | 2024-09-14T10:57:37.114969
  
4022 / tcp
-98713449 | 2024-09-14T06:51:22.581403
  
4040 / tcp
-98713449 | 2024-08-31T22:51:27.722330
  
4043 / tcp
-2031469209 | 2024-09-14T08:29:14.768730
  
4063 / tcp
-98713449 | 2024-09-14T08:52:10.584960
  
4064 / tcp
-1425212538 | 2024-09-14T08:27:16.862946
  
4242 / tcp
-98713449 | 2024-09-08T05:40:52.993492
  
4282 / tcp
-98713449 | 2024-09-14T09:08:28.535650
  
4321 / tcp
-98713449 | 2024-09-14T06:29:25.489036
  
4369 / tcp
-756278524 | 2024-09-14T08:28:19.101475
  
4433 / tcp
411540654 | 2024-09-02T00:20:43.971231
  
4434 / tcp
-116480039 | 2024-09-14T06:24:41.804487
  
4443 / tcp
-2031469209 | 2024-08-17T16:00:17.008268
  
4482 / tcp
-2031469209 | 2024-09-14T06:29:24.099891
  
4500 / tcp
-98713449 | 2024-09-14T08:05:20.692308
  
4506 / tcp
-2031469209 | 2024-09-14T08:53:49.885819
  
4567 / tcp
-98713449 | 2024-09-14T05:47:27.945395
  
4664 / tcp
-98713449 | 2024-08-15T12:41:14.777504
  
4747 / tcp
-98713449 | 2024-09-13T09:28:21.636603
  
4782 / tcp
-1478571435 | 2024-09-14T09:03:10.002384
  
4786 / tcp
-98713449 | 2024-08-31T18:13:50.583811
  
4808 / tcp
-2031469209 | 2024-09-13T22:03:57.559728
  
4840 / tcp
-98713449 | 2024-09-14T09:57:18.045972
  
4848 / tcp
-2031469209 | 2024-09-14T09:15:12.448337
  
4899 / tcp
-98713449 | 2024-09-13T14:56:34.737260
  
4911 / tcp
-98713449 | 2024-09-14T07:58:48.231600
  
4949 / tcp
1561587376 | 2024-09-14T06:52:51.288893
  
5000 / tcp
-2031469209 | 2024-09-14T10:13:54.200978
  
5005 / tcp
411540654 | 2024-09-14T10:42:30.550332
  
5006 / tcp
-98713449 | 2024-09-14T06:18:01.019120
  
5007 / tcp
-2031469209 | 2024-09-14T08:58:23.089416
  
5009 / tcp
-98713449 | 2024-09-14T04:58:16.142592
  
5010 / tcp
-2031469209 | 2024-09-14T05:38:58.719657
  
5025 / tcp
-2031469209 | 2024-09-03T00:28:40.505248
  
5090 / tcp
411540654 | 2024-09-14T04:46:53.356190
  
5172 / tcp
-98713449 | 2024-09-14T07:06:13.142019
  
5201 / tcp
-98713449 | 2024-09-14T11:45:54.830195
  
5222 / tcp
-98713449 | 2024-09-14T11:22:06.559229
  
5269 / tcp
-2031469209 | 2024-09-14T10:25:04.674169
  
5357 / tcp
-726790289 | 2024-09-14T11:14:13.145415
  
5432 / tcp
-98713449 | 2024-09-14T09:01:55.891382
  
5435 / tcp
-2031469209 | 2024-09-03T05:09:47.177489
  
5500 / tcp
-98713449 | 2024-09-14T11:20:50.768157
  
5560 / tcp
-2031469209 | 2024-09-10T02:34:42.616331
  
5595 / tcp
-98713449 | 2024-09-09T12:24:08.124687
  
5597 / tcp
997310454 | 2024-09-14T08:52:38.869275
  
5601 / tcp
-98713449 | 2024-08-29T21:45:46.854684
  
5697 / tcp
-98713449 | 2024-09-14T07:09:03.221862
  
5800 / tcp
-2031469209 | 2024-09-13T20:41:31.985348
  
5801 / tcp
-98713449 | 2024-09-14T08:01:33.973874
  
5858 / tcp
497968563 | 2024-09-14T09:44:44.368501
  
5900 / tcp
-98713449 | 2024-09-14T08:07:48.939551
  
5901 / tcp
-98713449 | 2024-09-10T15:08:29.686483
  
5908 / tcp
-98713449 | 2024-09-14T08:58:08.629899
  
5938 / tcp
-453886593 | 2024-09-14T06:34:19.361382
  
5984 / tcp
-427937664 | 2024-09-14T10:03:35.225533
  
5985 / tcp
-1951329375 | 2024-09-14T07:58:52.757827
  
5986 / tcp
-2031469209 | 2024-09-14T05:28:00.495880
  
6000 / tcp
-2031469209 | 2024-09-14T09:45:37.831676
  
6001 / tcp
-98713449 | 2024-09-14T07:53:59.144751
  
6002 / tcp
-98713449 | 2024-08-27T06:57:01.454134
  
6004 / tcp
-2031469209 | 2024-09-14T04:53:01.358961
  
6080 / tcp
-98713449 | 2024-08-26T15:29:03.198019
  
6161 / tcp
-1963419546 | 2024-09-14T11:45:13.124358
  
6379 / tcp
411540654 | 2024-09-14T05:17:33.554458
  
6443 / tcp
-2031469209 | 2024-09-12T20:46:07.248814
  
6510 / tcp
-98713449 | 2024-09-02T00:49:08.820504
  
6622 / tcp
-98713449 | 2024-09-14T02:36:38.458058
  
6633 / tcp
-98713449 | 2024-09-14T05:27:55.853608
  
6653 / tcp
-98713449 | 2024-09-14T01:12:31.668852
  
6664 / tcp
-98713449 | 2024-09-14T09:40:19.772189
  
6666 / tcp
-2031469209 | 2024-09-14T06:33:07.514917
  
6667 / tcp
-98713449 | 2024-09-14T05:03:02.965639
  
6668 / tcp
-2031469209 | 2024-09-14T06:27:10.079011
  
6697 / tcp
-2031469209 | 2024-08-23T12:53:40.807282
  
6748 / tcp
-2031469209 | 2024-08-30T07:40:36.848054
  
6998 / tcp
-1514911176 | 2024-09-13T15:28:03.329038
  
7001 / tcp
-2031469209 | 2024-08-21T14:40:58.610183
  
7002 / tcp
411540654 | 2024-09-13T21:33:15.071346
  
7071 / tcp
-2031469209 | 2024-09-13T20:58:52.951545
  
7171 / tcp
-2031469209 | 2024-09-14T09:38:09.257950
  
7218 / tcp
-2031469209 | 2024-08-27T21:16:19.090114
  
7316 / tcp
411540654 | 2024-09-05T20:43:16.992009
  
7434 / tcp
1094048410 | 2024-09-14T06:26:30.692286
  
7443 / tcp
-98713449 | 2024-09-08T22:55:23.536719
  
7445 / tcp
2105495716 | 2024-09-13T21:11:43.653184
  
7474 / tcp
-98713449 | 2024-09-03T11:39:44.850692
  
7493 / tcp
430537855 | 2024-09-14T11:07:00.028127
  
7547 / tcp
1094048410 | 2024-09-14T07:09:38.211527
  
7548 / tcp
-98713449 | 2024-08-27T22:17:55.675484
  
7557 / tcp
-2031469209 | 2024-09-14T10:37:13.003131
  
7634 / tcp
-98713449 | 2024-08-24T04:08:36.793410
  
7654 / tcp
-2031469209 | 2024-09-14T10:49:05.276824
  
7657 / tcp
-98713449 | 2024-08-19T09:20:05.502752
  
7700 / tcp
-2031469209 | 2024-09-14T10:01:59.999340
  
7777 / tcp
-2031469209 | 2024-09-02T17:48:06.939333
  
7778 / tcp
-98713449 | 2024-09-14T07:40:54.361603
  
7779 / tcp
-98713449 | 2024-09-14T04:23:05.622313
  
7989 / tcp
-98713449 | 2024-09-03T14:03:17.657115
  
7998 / tcp
1832614531 | 2024-09-14T08:12:53.878044
  
8000 / tcp
-207704745 | 2024-09-14T08:54:29.485630
  
8001 / tcp
-207704745 | 2024-09-12T11:44:36.931606
  
8002 / tcp
-1971901369 | 2024-09-03T00:06:48.343227
  
8004 / tcp
-207704745 | 2024-09-13T20:26:43.885670
  
8008 / tcp
-207704745 | 2024-09-14T05:29:56.976754
  
8009 / tcp
-207704745 | 2024-09-14T08:56:53.369134
  
8010 / tcp
-98713449 | 2024-08-18T02:09:52.533181
  
8026 / tcp
-2031469209 | 2024-08-24T00:23:04.212196
  
8031 / tcp
-98713449 | 2024-08-17T20:26:36.027335
  
8044 / tcp
-98713449 | 2024-08-19T00:16:40.696303
  
8046 / tcp
-2031469209 | 2024-09-04T03:55:39.845088
  
8053 / tcp
-2031469209 | 2024-09-14T10:14:34.251655
  
8060 / tcp
-98713449 | 2024-09-14T09:27:27.747209
  
8069 / tcp
1793581629 | 2024-09-14T09:44:48.581492
  
8080 / tcp
831191633 | 2024-09-14T06:36:39.188628
  
8081 / tcp
492197718 | 2024-09-03T16:21:14.592091
  
8085 / tcp
-207704745 | 2024-09-14T09:45:34.744100
  
8086 / tcp
980896300 | 2024-09-14T10:19:51.839507
  
8089 / tcp
1685468267 | 2024-09-14T10:08:10.765982
  
8090 / tcp
-98713449 | 2024-09-08T07:56:47.548040
  
8096 / tcp
-98713449 | 2024-09-14T06:09:04.232042
  
8098 / tcp
-1231754777 | 2024-09-14T11:30:04.827998
  
8099 / tcp
-2031469209 | 2024-08-26T16:02:45.064129
  
8100 / tcp
-98713449 | 2024-09-13T03:11:57.378971
  
8103 / tcp
-98713449 | 2024-09-05T04:34:29.801856
  
8110 / tcp
-98713449 | 2024-09-14T05:45:33.646273
  
8112 / tcp
-2031469209 | 2024-09-14T00:57:21.291216
  
8123 / tcp
-98713449 | 2024-09-14T06:16:21.791421
  
8126 / tcp
411540654 | 2024-09-14T10:32:32.052743
  
8139 / tcp
411540654 | 2024-09-14T11:46:38.966146
  
8140 / tcp
-2031469209 | 2024-08-31T15:45:58.045575
  
8143 / tcp
-2133235823 | 2024-09-14T08:55:48.022383
  
8181 / tcp
-98713449 | 2024-08-29T17:48:56.587709
  
8188 / tcp
-2031469209 | 2024-09-14T07:31:27.170272
  
8200 / tcp
1191162421 | 2024-09-14T04:36:12.264325
  
8291 / tcp
-2031469209 | 2024-09-14T08:31:51.825528
  
8333 / tcp
-2031469209 | 2024-09-14T07:05:49.339906
  
8334 / tcp
-98713449 | 2024-08-26T21:05:48.682494
  
8404 / tcp
-98713449 | 2024-08-23T21:40:26.764050
  
8409 / tcp
-98713449 | 2024-08-24T14:05:29.325491
  
8416 / tcp
-98713449 | 2024-09-05T17:46:53.628151
  
8424 / tcp
-98713449 | 2024-09-11T04:36:26.248110
  
8428 / tcp
-904356667 | 2024-09-14T07:39:56.434674
  
8443 / tcp
-98713449 | 2024-09-13T19:43:15.838830
  
8444 / tcp
411540654 | 2024-09-14T09:56:44.763269
  
8500 / tcp
-1341732464 | 2024-09-14T06:40:07.648274
  
8545 / tcp
-2031469209 | 2024-09-14T09:21:16.974272
  
8554 / tcp
-98713449 | 2024-09-14T04:30:51.273989
  
8575 / tcp
-98713449 | 2024-09-14T02:48:13.572463
  
8649 / tcp
-98713449 | 2024-08-19T06:11:41.206479
  
8666 / tcp
-98713449 | 2024-09-12T01:38:49.785589
  
8733 / tcp
-2031469209 | 2024-08-29T19:11:49.910273
  
8766 / tcp
-98713449 | 2024-09-08T04:57:59.224640
  
8767 / tcp
-2031469209 | 2024-08-24T11:40:24.741670
  
8789 / tcp
-98713449 | 2024-09-14T05:23:25.125997
  
8800 / tcp
-2031469209 | 2024-08-30T11:54:59.199102
  
8804 / tcp
-2031469209 | 2024-08-24T06:38:23.908726
  
8807 / tcp
-98713449 | 2024-08-19T15:03:52.016220
  
8812 / tcp
-2031469209 | 2024-08-22T23:20:24.948248
  
8813 / tcp
-98713449 | 2024-09-11T16:03:05.627849
  
8814 / tcp
-2031469209 | 2024-08-16T19:24:15.481530
  
8821 / tcp
-2031469209 | 2024-09-13T13:38:01.136467
  
8829 / tcp
1094048410 | 2024-09-14T10:05:54.729031
  
8834 / tcp
-2031469209 | 2024-08-19T20:41:23.504500
  
8836 / tcp
-98713449 | 2024-08-27T04:50:51.033209
  
8843 / tcp
-98713449 | 2024-09-01T15:54:37.472077
  
8848 / tcp
-98713449 | 2024-08-25T03:17:19.154981
  
8851 / tcp
-98713449 | 2024-09-08T21:27:25.542084
  
8855 / tcp
-98713449 | 2024-08-30T07:15:09.333465
  
8856 / tcp
-98713449 | 2024-09-03T20:56:39.027990
  
8862 / tcp
-98713449 | 2024-09-06T18:16:47.389324
  
8874 / tcp
411540654 | 2024-09-14T09:38:28.884246
  
8880 / tcp
-98713449 | 2024-09-07T08:34:58.572993
  
8885 / tcp
1832614531 | 2024-09-13T22:00:59.951267
  
8888 / tcp
411540654 | 2024-09-14T05:42:50.707703
  
8889 / tcp
-98713449 | 2024-09-08T19:10:29.572622
  
8999 / tcp
-1714287109 | 2024-09-14T08:13:37.193179
  
9000 / tcp
1634741987 | 2024-09-14T02:53:50.640966
  
9001 / tcp
1094048410 | 2024-09-13T13:02:02.136494
  
9002 / tcp
-2031469209 | 2024-09-13T22:09:47.207737
  
9009 / tcp
-98713449 | 2024-08-26T17:34:45.349701
  
9013 / tcp
-2031469209 | 2024-09-01T16:48:34.064191
  
9016 / tcp
-98713449 | 2024-08-26T11:00:15.462400
  
9031 / tcp
-98713449 | 2024-09-14T07:21:27.857631
  
9042 / tcp
-98713449 | 2024-09-09T07:29:21.446220
  
9048 / tcp
-98713449 | 2024-08-23T07:56:22.436516
  
9050 / tcp
-2031469209 | 2024-09-14T05:23:44.766445
  
9051 / tcp
-2113003112 | 2024-09-14T09:42:22.277708
  
9080 / tcp
-2031469209 | 2024-09-05T17:23:53.278972
  
9089 / tcp
2005929508 | 2024-09-14T06:08:40.435569
  
9090 / tcp
1094048410 | 2024-09-14T10:49:01.050619
  
9091 / tcp
-98713449 | 2024-09-14T08:36:53.350355
  
9092 / tcp
-98713449 | 2024-09-12T12:58:48.413892
  
9095 / tcp
-98713449 | 2024-09-08T23:32:03.867151
  
9096 / tcp
-2031469209 | 2024-09-14T07:47:32.636117
  
9100 / tcp
-2031469209 | 2024-08-29T21:09:54.712895
  
9110 / tcp
-2031469209 | 2024-09-14T11:12:28.951546
  
9151 / tcp
-98713449 | 2024-09-14T08:58:04.786560
  
9160 / tcp
521951111 | 2024-09-14T05:10:28.962625
  
9191 / tcp
-2031469209 | 2024-08-30T00:09:28.167320
  
9199 / tcp
1701962934 | 2024-09-14T08:40:28.280557
  
9200 / tcp
-98713449 | 2024-09-12T06:45:56.287695
  
9207 / tcp
-98713449 | 2024-09-02T16:41:14.927998
  
9209 / tcp
-98713449 | 2024-08-22T01:20:38.798232
  
9216 / tcp
-2031469209 | 2024-08-30T17:42:54.489448
  
9218 / tcp
-98713449 | 2024-09-14T07:54:49.006940
  
9295 / tcp
-98713449 | 2024-09-10T18:10:57.280787
  
9302 / tcp
-2031469209 | 2024-09-03T09:42:33.221167
  
9303 / tcp
411540654 | 2024-09-14T08:11:01.460712
  
9306 / tcp
-2031469209 | 2024-08-26T13:21:08.958004
  
9308 / tcp
411540654 | 2024-09-04T00:00:06.134318
  
9398 / tcp
-98713449 | 2024-09-14T08:24:00.197251
  
9418 / tcp
864306896 | 2024-09-14T10:16:50.052537
  
9443 / tcp
-98713449 | 2024-09-12T07:36:15.800412
  
9444 / tcp
-2031469209 | 2024-09-14T11:15:32.333674
  
9530 / tcp
-2031469209 | 2024-09-14T09:42:20.345607
  
9595 / tcp
-2031469209 | 2024-09-14T11:13:09.201718
  
9600 / tcp
-2031469209 | 2024-08-26T01:29:28.959653
  
9663 / tcp
-98713449 | 2024-08-15T21:27:45.597313
  
9735 / tcp
-98713449 | 2024-09-14T05:58:15.421681
  
9761 / tcp
-98713449 | 2024-08-24T23:31:40.377727
  
9765 / tcp
-98713449 | 2024-09-14T10:59:36.734997
  
9800 / tcp
-98713449 | 2024-09-14T10:23:16.153413
  
9869 / tcp
-98713449 | 2024-09-12T05:55:02.718363
  
9876 / tcp
411540654 | 2024-09-14T11:37:06.467196
  
9943 / tcp
-98713449 | 2024-09-14T10:33:42.783674
  
9944 / tcp
-98713449 | 2024-08-25T22:21:32.692923
  
9966 / tcp
-98713449 | 2024-09-14T08:08:34.820642
  
9981 / tcp
-98713449 | 2024-08-28T08:37:39.435720
  
9988 / tcp
-2031469209 | 2024-09-08T12:24:30.543113
  
9992 / tcp
-98713449 | 2024-09-14T03:00:37.671615
  
9998 / tcp
-649041219 | 2024-09-14T10:07:58.840926
  
9999 / tcp
730962427 | 2024-09-14T10:11:32.123890
  
10000 / tcp
-98713449 | 2024-09-14T10:03:59.409576
  
10001 / tcp
-98713449 | 2024-08-28T23:38:48.407497
  
10073 / tcp
-2031469209 | 2024-08-28T22:12:33.993031
  
10143 / tcp
-98713449 | 2024-09-14T08:54:34.593193
  
10243 / tcp
411540654 | 2024-09-14T03:57:29.138042
  
10250 / tcp
1793581629 | 2024-09-14T05:40:23.819037
  
10443 / tcp
-98713449 | 2024-09-14T09:36:57.090531
  
10554 / tcp
-2031469209 | 2024-08-27T16:18:05.606392
  
10909 / tcp
-98713449 | 2024-08-31T14:44:36.460932
  
10911 / tcp
-98713449 | 2024-09-14T01:16:36.097454
  
11000 / tcp
-98713449 | 2024-09-14T09:15:56.622481
  
11112 / tcp
-2031469209 | 2024-09-14T08:27:48.854233
  
11210 / tcp
2034197593 | 2024-09-14T07:58:41.330605
  
11211 / tcp
-2031469209 | 2024-09-14T09:36:58.104954
  
11300 / tcp
-98713449 | 2024-09-14T11:30:15.508914
  
11371 / tcp
-98713449 | 2024-09-13T10:23:13.892531
  
11434 / tcp
-2031469209 | 2024-09-14T04:51:37.987983
  
12000 / tcp
-2031469209 | 2024-08-27T19:13:48.789608
  
12235 / tcp
-2031469209 | 2024-09-14T01:25:50.156650
  
13579 / tcp
-98713449 | 2024-09-14T04:45:58.726222
  
14147 / tcp
-98713449 | 2024-09-14T06:09:54.829966
  
14265 / tcp
-98713449 | 2024-09-03T17:42:35.869023
  
16010 / tcp
-98713449 | 2024-08-29T23:48:40.234452
  
16030 / tcp
-98713449 | 2024-09-03T22:29:23.149502
  
16285 / tcp
998037014 | 2024-09-14T04:16:56.997367
  
16992 / tcp
1669948109 | 2024-09-02T02:24:11.922966
  
16993 / tcp
-98713449 | 2024-09-13T23:36:47.951442
  
17000 / tcp
1360265918 | 2024-08-20T07:04:12.842292
  
18080 / tcp
1859111832 | 2024-09-14T04:42:10.299996
  
18081 / tcp
-2031469209 | 2024-09-14T05:19:14.180053
  
18245 / tcp
411540654 | 2024-08-23T03:21:46.708906
  
18553 / tcp
-98713449 | 2024-09-14T09:57:31.230707
  
19000 / tcp
-98713449 | 2024-09-14T10:58:53.096046
  
19071 / tcp
-2031469209 | 2024-09-14T10:30:01.322435
  
20000 / tcp
-98713449 | 2024-09-14T08:07:42.487557
  
20256 / tcp
-98713449 | 2024-09-14T05:46:32.570885
  
20547 / tcp
-98713449 | 2024-09-14T08:50:45.881969
  
21025 / tcp
411540654 | 2024-08-24T19:33:52.564387
  
21027 / tcp
-98713449 | 2024-09-14T11:05:31.865324
  
21379 / tcp
1094048410 | 2024-08-25T03:34:24.549449
  
22000 / tcp
411540654 | 2024-08-22T07:44:32.905678
  
22001 / tcp
-98713449 | 2024-09-04T18:43:43.434191
  
22067 / tcp
411540654 | 2024-08-21T21:54:45.938245
  
22070 / tcp
411540654 | 2024-08-18T11:45:58.839945
  
22556 / tcp
-98713449 | 2024-09-14T06:06:06.144219
  
23023 / tcp
-98713449 | 2024-09-14T09:02:15.013389
  
23424 / tcp
-98713449 | 2024-09-14T07:43:14.997815
  
25001 / tcp
-2031469209 | 2024-09-14T10:23:57.139227
  
25105 / tcp
-2031469209 | 2024-09-14T06:41:14.075499
  
25565 / tcp
411540654 | 2024-08-17T20:43:53.012236
  
26656 / tcp
-98713449 | 2024-08-22T17:04:39.256586
  
28000 / tcp
-2031469209 | 2024-09-14T11:04:54.468746
  
28015 / tcp
-98713449 | 2024-09-14T09:11:36.335399
  
28017 / tcp
-98713449 | 2024-09-14T05:33:10.847470
  
30002 / tcp
-98713449 | 2024-09-14T10:22:04.909556
  
30003 / tcp
411540654 | 2024-08-21T09:58:49.120532
  
30303 / tcp
411540654 | 2024-09-14T02:39:21.493783
  
31337 / tcp
-2031469209 | 2024-08-29T11:00:47.519341
  
31401 / tcp
1094048410 | 2024-08-16T12:30:34.480925
  
31443 / tcp
-98713449 | 2024-09-14T05:31:00.316233
  
32400 / tcp
-2031469209 | 2024-09-14T10:42:56.478477
  
32764 / tcp
-98713449 | 2024-09-14T05:28:12.846560
  
33060 / tcp
-2031469209 | 2024-08-20T16:26:06.011060
  
33445 / tcp
-98713449 | 2024-09-14T08:44:22.916402
  
35000 / tcp
-2031469209 | 2024-09-13T21:29:09.197455
  
37777 / tcp
411540654 | 2024-08-18T00:22:23.658611
  
38333 / tcp
-2031469209 | 2024-09-12T19:33:00.701829
  
39277 / tcp
-2031469209 | 2024-09-14T04:44:27.386000
  
41800 / tcp
-2031469209 | 2024-09-03T20:45:09.716223
  
42398 / tcp
-2031469209 | 2024-08-24T02:26:47.498277
  
43118 / tcp
-98713449 | 2024-09-14T11:32:11.627832
  
44158 / tcp
1094048410 | 2024-09-05T11:14:32.704158
  
47990 / tcp
-98713449 | 2024-09-14T06:07:34.837877
  
49152 / tcp
411540654 | 2024-09-14T06:54:16.649385
  
50000 / tcp
-98713449 | 2024-09-14T10:00:39.242945
  
50050 / tcp
1869901852 | 2024-09-14T11:46:34.890485
  
50070 / tcp
-2031469209 | 2024-09-14T11:15:23.359516
  
50100 / tcp
-2031469209 | 2024-08-22T21:08:52.714706
  
50719 / tcp
-98713449 | 2024-09-14T11:12:09.037709
  
51106 / tcp
-98713449 | 2024-09-14T06:02:31.897083
  
51235 / tcp
-98713449 | 2024-09-14T05:56:22.744845
  
52311 / tcp
-2031469209 | 2024-09-14T09:27:50.562890
  
52869 / tcp
-1959516545 | 2024-09-14T11:05:45.223228
  
53413 / udp
-2031469209 | 2024-09-14T09:19:09.983037
  
54138 / tcp
-98713449 | 2024-09-05T05:04:38.706325
  
54321 / tcp
-98713449 | 2024-08-28T20:20:00.707695
  
54361 / tcp
-98713449 | 2024-09-14T10:00:34.340723
  
55000 / tcp
-98713449 | 2024-09-14T11:27:52.566540
  
55442 / tcp
411540654 | 2024-09-14T05:02:25.165210
  
55443 / tcp
411540654 | 2024-09-14T11:29:02.241544
  
55553 / tcp
-2031469209 | 2024-09-14T05:00:33.987646
  
55554 / tcp
-98713449 | 2024-09-14T09:43:59.250115
  
60001 / tcp
-98713449 | 2024-09-09T01:26:54.543042
  
60010 / tcp
-2031469209 | 2024-09-07T23:44:50.488719
  
60030 / tcp
-98713449 | 2024-09-03T23:48:01.521464
  
60567 / tcp
-2031469209 | 2024-09-14T11:43:52.160137
  
61613 / tcp
-98713449 | 2024-09-14T10:42:43.606487
  
61616 / tcp
-98713449 | 2024-09-14T04:12:28.926302
  
62078 / tcp
-98713449 | 2024-08-23T13:56:44.668961
  
62200 / tcp
-2031469209 | 2024-09-01T00:02:02.053580
  
63210 / tcp



Contact Us

Shodan ® - All rights reserved

\", which results in the enclosed script logic to be executed.","verified":false},"CVE-2020-1971":{"cvss":4.3,"ports":[9080],"summary":"The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).","verified":false},"CVE-2020-1968":{"cvss":4.3,"ports":[9080],"summary":"The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).","verified":false},"CVE-2020-1934":{"cvss":5.0,"ports":[9080],"summary":"In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.","verified":false},"CVE-2020-1927":{"cvss":5.8,"ports":[9080],"summary":"In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.","verified":false},"CVE-2019-17567":{"cvss":5.0,"ports":[9080],"summary":"Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.","verified":false},"CVE-2019-16884":{"cvss":5.0,"ports":[5000],"summary":"runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.","verified":false},"CVE-2019-13509":{"cvss":5.0,"ports":[5000],"summary":"In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.","verified":false},"CVE-2019-11358":{"cvss":4.3,"ports":[87,88,4433,9080,50070],"summary":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","verified":false},"CVE-2019-11072":{"cvss":7.5,"ports":[88],"summary":"lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states \"The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e.g. lighttpd.conf). Certain input will trigger an abort() in lighttpd when that feature is enabled. lighttpd detects the underflow or realloc() will fail (in both 32-bit and 64-bit executables), also detected in lighttpd. Either triggers an explicit abort() by lighttpd. This is not exploitable beyond triggering the explicit abort() with subsequent application exit.","verified":false},"CVE-2019-10247":{"cvss":5.0,"ports":[8000,8888],"summary":"In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.","verified":false},"CVE-2019-10241":{"cvss":4.3,"ports":[8000,8888],"summary":"In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.","verified":false},"CVE-2019-10098":{"cvss":5.8,"ports":[9080],"summary":"In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.","verified":false},"CVE-2019-10092":{"cvss":4.3,"ports":[9080],"summary":"In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.","verified":false},"CVE-2019-9641":{"cvss":7.5,"ports":[9080],"summary":"An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.","verified":false},"CVE-2019-9639":{"cvss":5.0,"ports":[9080],"summary":"An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.","verified":false},"CVE-2019-9638":{"cvss":5.0,"ports":[9080],"summary":"An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.","verified":false},"CVE-2019-9637":{"cvss":5.0,"ports":[9080],"summary":"An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.","verified":false},"CVE-2019-9024":{"cvss":5.0,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.","verified":false},"CVE-2019-9023":{"cvss":7.5,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.","verified":false},"CVE-2019-9021":{"cvss":7.5,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.","verified":false},"CVE-2019-9020":{"cvss":7.5,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.","verified":false},"CVE-2019-8331":{"cvss":4.3,"ports":[87,50070],"summary":"In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.","verified":false},"CVE-2019-6977":{"cvss":6.8,"ports":[9080],"summary":"gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.","verified":false},"CVE-2019-5736":{"cvss":9.3,"ports":[5000],"summary":"runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.","verified":false},"CVE-2019-1563":{"cvss":4.3,"ports":[9080],"summary":"In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).","verified":false},"CVE-2019-1559":{"cvss":4.3,"ports":[9080],"summary":"If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).","verified":false},"CVE-2019-1552":{"cvss":1.9,"ports":[9080],"summary":"OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).","verified":false},"CVE-2019-1551":{"cvss":5.0,"ports":[9080],"summary":"There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).","verified":false},"CVE-2019-1547":{"cvss":1.9,"ports":[9080],"summary":"Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).","verified":false},"CVE-2019-0220":{"cvss":5.0,"ports":[9080],"summary":"A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.","verified":false},"CVE-2019-0217":{"cvss":6.0,"ports":[9080],"summary":"In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.","verified":false},"CVE-2018-20783":{"cvss":5.0,"ports":[9080],"summary":"In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c.","verified":false},"CVE-2018-20677":{"cvss":4.3,"ports":[87,50070],"summary":"In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.","verified":false},"CVE-2018-20676":{"cvss":4.3,"ports":[87,50070],"summary":"In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.","verified":false},"CVE-2018-19520":{"cvss":6.5,"ports":[9080],"summary":"An issue was discovered in SDCMS 1.6 with PHP 5.x. app/admin/controller/themecontroller.php uses a check_bad function in an attempt to block certain PHP functions such as eval, but does not prevent use of preg_replace 'e' calls, allowing users to execute arbitrary code by leveraging access to admin template management.","verified":false},"CVE-2018-19396":{"cvss":5.0,"ports":[9080],"summary":"ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.","verified":false},"CVE-2018-19395":{"cvss":5.0,"ports":[9080],"summary":"ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM(\"WScript.Shell\").","verified":false},"CVE-2018-19052":{"cvss":5.0,"ports":[88],"summary":"An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.","verified":false},"CVE-2018-17199":{"cvss":5.0,"ports":[9080],"summary":"In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.","verified":false},"CVE-2018-17188":{"cvss":6.5,"ports":[5984],"summary":"Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, it allowed full system entry for unauthenticated users. Rather than waiting for new vulnerabilities to be discovered, and fixing them as they come up, the CouchDB development team decided to make changes to avoid this entire class of vulnerabilities.","verified":false},"CVE-2018-17082":{"cvss":4.3,"ports":[9080],"summary":"The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a \"Transfer-Encoding: chunked\" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.","verified":false},"CVE-2018-15514":{"cvss":6.5,"ports":[5000],"summary":"HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\\\.\\pipe\\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the \"docker-users\" group (who may not otherwise have administrator access) to escalate to administrator privileges.","verified":false},"CVE-2018-15132":{"cvss":5.0,"ports":[9080],"summary":"An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.","verified":false},"CVE-2018-14883":{"cvss":5.0,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.","verified":false},"CVE-2018-14851":{"cvss":4.3,"ports":[9080],"summary":"exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.","verified":false},"CVE-2018-14042":{"cvss":4.3,"ports":[87,50070],"summary":"In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.","verified":false},"CVE-2018-14040":{"cvss":4.3,"ports":[87,50070],"summary":"In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.","verified":false},"CVE-2018-12536":{"cvss":5.0,"ports":[8000,8888],"summary":"In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.","verified":false},"CVE-2018-11769":{"cvss":9.0,"ports":[5984],"summary":"CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.","verified":false},"CVE-2018-10549":{"cvss":6.8,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\\0' character.","verified":false},"CVE-2018-10548":{"cvss":5.0,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. ext/ldap/ldap.c allows remote LDAP servers to cause a denial of service (NULL pointer dereference and application crash) because of mishandling of the ldap_get_dn return value.","verified":false},"CVE-2018-10547":{"cvss":4.3,"ports":[9080],"summary":"An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.","verified":false},"CVE-2018-10546":{"cvss":5.0,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.","verified":false},"CVE-2018-10545":{"cvss":1.9,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.","verified":false},"CVE-2018-8007":{"cvss":9.0,"ports":[5984],"summary":"Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.","verified":false},"CVE-2018-7584":{"cvss":7.5,"ports":[9080],"summary":"In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.","verified":false},"CVE-2018-5712":{"cvss":4.3,"ports":[9080],"summary":"An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.","verified":false},"CVE-2018-5711":{"cvss":4.3,"ports":[9080],"summary":"gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.","verified":false},"CVE-2018-5407":{"cvss":1.9,"ports":[9080],"summary":"Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.","verified":false},"CVE-2018-1312":{"cvss":6.8,"ports":[9080],"summary":"In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.","verified":false},"CVE-2018-1303":{"cvss":5.0,"ports":[9080],"summary":"A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.","verified":false},"CVE-2018-1302":{"cvss":4.3,"ports":[9080],"summary":"When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.","verified":false},"CVE-2018-1301":{"cvss":4.3,"ports":[9080],"summary":"A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.","verified":false},"CVE-2018-1283":{"cvss":3.5,"ports":[9080],"summary":"In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a \"Session\" header. This comes from the \"HTTP_SESSION\" variable name used by mod_session to forward its data to CGIs, since the prefix \"HTTP_\" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.","verified":false},"CVE-2018-0739":{"cvss":4.3,"ports":[9080],"summary":"Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).","verified":false},"CVE-2018-0737":{"cvss":4.3,"ports":[9080],"summary":"The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).","verified":false},"CVE-2018-0734":{"cvss":4.3,"ports":[9080],"summary":"The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).","verified":false},"CVE-2018-0732":{"cvss":5.0,"ports":[9080],"summary":"During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).","verified":false},"CVE-2017-16642":{"cvss":5.0,"ports":[9080],"summary":"In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: this is a different issue than CVE-2017-11145.","verified":false},"CVE-2017-15715":{"cvss":6.8,"ports":[9080],"summary":"In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.","verified":false},"CVE-2017-15710":{"cvss":5.0,"ports":[9080],"summary":"In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.","verified":false},"CVE-2017-12933":{"cvss":7.5,"ports":[9080],"summary":"The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.","verified":false},"CVE-2017-12868":{"cvss":7.5,"ports":[9080],"summary":"The secureCompare method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.13 and earlier, when used with PHP before 5.6, allows attackers to conduct session fixation attacks or possibly bypass authentication by leveraging missing character conversions before an XOR operation.","verified":false},"CVE-2017-12636":{"cvss":9.0,"ports":[5984],"summary":"CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.","verified":false},"CVE-2017-12635":{"cvss":10.0,"ports":[5984],"summary":"Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.","verified":false},"CVE-2017-11628":{"cvss":6.8,"ports":[9080],"summary":"In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.","verified":false},"CVE-2017-11147":{"cvss":6.4,"ports":[9080],"summary":"In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.","verified":false},"CVE-2017-11145":{"cvss":5.0,"ports":[9080],"summary":"In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist.","verified":false},"CVE-2017-11144":{"cvss":5.0,"ports":[9080],"summary":"In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the openssl extension PEM sealing code did not check the return value of the OpenSSL sealing function, which could lead to a crash of the PHP interpreter, related to an interpretation conflict for a negative number in ext/openssl/openssl.c, and an OpenSSL documentation omission.","verified":false},"CVE-2017-11143":{"cvss":5.0,"ports":[9080],"summary":"In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.","verified":false},"CVE-2017-11142":{"cvss":7.8,"ports":[9080],"summary":"In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.","verified":false},"CVE-2017-9798":{"cvss":5.0,"ports":[9080],"summary":"Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.","verified":false},"CVE-2017-9788":{"cvss":6.4,"ports":[9080],"summary":"In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.","verified":false},"CVE-2017-9735":{"cvss":5.0,"ports":[8000,8888,50070],"summary":"Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.","verified":false},"CVE-2017-9226":{"cvss":7.5,"ports":[9080],"summary":"An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.","verified":false},"CVE-2017-9224":{"cvss":7.5,"ports":[9080],"summary":"An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.","verified":false},"CVE-2017-8923":{"cvss":7.5,"ports":[9080],"summary":"The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.","verified":false},"CVE-2017-7963":{"cvss":5.0,"ports":[9080],"summary":"The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating \"There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.","verified":false},"CVE-2017-7890":{"cvss":4.3,"ports":[9080],"summary":"The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.","verified":false},"CVE-2017-7679":{"cvss":7.5,"ports":[9080],"summary":"In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.","verified":false},"CVE-2017-7658":{"cvss":7.5,"ports":[8000,8888,50070],"summary":"In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.","verified":false},"CVE-2017-7657":{"cvss":7.5,"ports":[8000,8888,50070],"summary":"In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.","verified":false},"CVE-2017-7656":{"cvss":5.0,"ports":[8000,8888,50070],"summary":"In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.","verified":false},"CVE-2017-7272":{"cvss":5.8,"ports":[9080],"summary":"PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.","verified":false},"CVE-2017-3738":{"cvss":4.3,"ports":[9080],"summary":"There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.","verified":false},"CVE-2017-3737":{"cvss":4.3,"ports":[9080],"summary":"OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \"error state\" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.","verified":false},"CVE-2017-3736":{"cvss":4.0,"ports":[9080],"summary":"There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.","verified":false},"CVE-2017-3735":{"cvss":5.0,"ports":[9080],"summary":"While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.","verified":false},"CVE-2017-3167":{"cvss":7.5,"ports":[9080],"summary":"In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.","verified":false},"CVE-2016-10735":{"cvss":4.3,"ports":[87,50070],"summary":"In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.","verified":false},"CVE-2016-10712":{"cvss":5.0,"ports":[9080],"summary":"In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a \"$uri = stream_get_meta_data(fopen($file, \"r\"))['uri']\" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.","verified":false},"CVE-2016-10707":{"cvss":5.0,"ports":[87],"summary":"jQuery 3.0.0-rc.1 is vulnerable to Denial of Service (DoS) due to removing a logic that lowercased attribute names. Any attribute getter using a mixed-cased name for boolean attributes goes into an infinite recursion, exceeding the stack call limit.","verified":false},"CVE-2016-10397":{"cvss":5.0,"ports":[9080],"summary":"In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).","verified":false},"CVE-2016-10161":{"cvss":5.0,"ports":[9080],"summary":"The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.","verified":false},"CVE-2016-10159":{"cvss":5.0,"ports":[9080],"summary":"Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive.","verified":false},"CVE-2016-10158":{"cvss":5.0,"ports":[9080],"summary":"The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.","verified":false},"CVE-2016-9935":{"cvss":7.5,"ports":[9080],"summary":"The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.","verified":false},"CVE-2016-9934":{"cvss":5.0,"ports":[9080],"summary":"ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.","verified":false},"CVE-2016-9933":{"cvss":5.0,"ports":[9080],"summary":"Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.","verified":false},"CVE-2016-9138":{"cvss":7.5,"ports":[9080],"summary":"PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modification during __wakeup processing, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data, as demonstrated by Exception::__toString with DateInterval::__wakeup.","verified":false},"CVE-2016-9137":{"cvss":7.5,"ports":[9080],"summary":"Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.","verified":false},"CVE-2016-8743":{"cvss":5.0,"ports":[9080],"summary":"Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.","verified":false},"CVE-2016-8670":{"cvss":7.5,"ports":[9080],"summary":"Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.","verified":false},"CVE-2016-8612":{"cvss":3.3,"ports":[9080],"summary":"Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.","verified":false},"CVE-2016-7478":{"cvss":5.0,"ports":[9080],"summary":"Zend/zend_exceptions.c in PHP, possibly 5.x before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (infinite loop) via a crafted Exception object in serialized data, a related issue to CVE-2015-8876.","verified":false},"CVE-2016-7418":{"cvss":5.0,"ports":[9080],"summary":"The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.","verified":false},"CVE-2016-7417":{"cvss":7.5,"ports":[9080],"summary":"ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.","verified":false},"CVE-2016-7416":{"cvss":5.0,"ports":[9080],"summary":"ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.","verified":false},"CVE-2016-7414":{"cvss":7.5,"ports":[9080],"summary":"The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.","verified":false},"CVE-2016-7413":{"cvss":7.5,"ports":[9080],"summary":"Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.","verified":false},"CVE-2016-7412":{"cvss":6.8,"ports":[9080],"summary":"ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.","verified":false},"CVE-2016-7411":{"cvss":7.5,"ports":[9080],"summary":"ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.","verified":false},"CVE-2016-7132":{"cvss":5.0,"ports":[9080],"summary":"ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing.","verified":false},"CVE-2016-7131":{"cvss":5.0,"ports":[9080],"summary":"ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a < (less than) character.","verified":false},"CVE-2016-7130":{"cvss":5.0,"ports":[9080],"summary":"The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.","verified":false},"CVE-2016-7129":{"cvss":7.5,"ports":[9080],"summary":"The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document.","verified":false},"CVE-2016-7128":{"cvss":5.0,"ports":[9080],"summary":"The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.","verified":false},"CVE-2016-7127":{"cvss":7.5,"ports":[9080],"summary":"The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.","verified":false},"CVE-2016-7126":{"cvss":7.5,"ports":[9080],"summary":"The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.","verified":false},"CVE-2016-7125":{"cvss":5.0,"ports":[9080],"summary":"ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.","verified":false},"CVE-2016-7124":{"cvss":7.5,"ports":[9080],"summary":"ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.","verified":false},"CVE-2016-6297":{"cvss":6.8,"ports":[9080],"summary":"Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted zip:// URL.","verified":false},"CVE-2016-6296":{"cvss":7.5,"ports":[9080],"summary":"Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.","verified":false},"CVE-2016-6295":{"cvss":7.5,"ports":[9080],"summary":"ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via crafted serialized data, a related issue to CVE-2016-5773.","verified":false},"CVE-2016-6294":{"cvss":7.5,"ports":[9080],"summary":"The locale_accept_from_http function in ext/intl/locale/locale_methods.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly restrict calls to the ICU uloc_acceptLanguageFromHTTP function, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long argument.","verified":false},"CVE-2016-6292":{"cvss":4.3,"ports":[9080],"summary":"The exif_process_user_comment function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted JPEG image.","verified":false},"CVE-2016-6291":{"cvss":7.5,"ports":[9080],"summary":"The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impact via a crafted JPEG image.","verified":false},"CVE-2016-6290":{"cvss":7.5,"ports":[9080],"summary":"ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.","verified":false},"CVE-2016-6289":{"cvss":6.8,"ports":[9080],"summary":"Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.","verified":false},"CVE-2016-6288":{"cvss":7.5,"ports":[9080],"summary":"The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type.","verified":false},"CVE-2016-6174":{"cvss":6.8,"ports":[9080],"summary":"applications/core/modules/front/system/content.php in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) before 4.1.13, when used with PHP before 5.4.24 or 5.5.x before 5.5.8, allows remote attackers to execute arbitrary code via the content_class parameter.","verified":false},"CVE-2016-5773":{"cvss":7.5,"ports":[9080],"summary":"php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.","verified":false},"CVE-2016-5772":{"cvss":7.5,"ports":[9080],"summary":"Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.","verified":false},"CVE-2016-5771":{"cvss":7.5,"ports":[9080],"summary":"spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.","verified":false},"CVE-2016-5770":{"cvss":7.5,"ports":[9080],"summary":"Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096.","verified":false},"CVE-2016-5769":{"cvss":7.5,"ports":[9080],"summary":"Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.","verified":false},"CVE-2016-5768":{"cvss":7.5,"ports":[9080],"summary":"Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.","verified":false},"CVE-2016-5767":{"cvss":6.8,"ports":[9080],"summary":"Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.","verified":false},"CVE-2016-5766":{"cvss":6.8,"ports":[9080],"summary":"Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.","verified":false},"CVE-2016-5399":{"cvss":6.8,"ports":[9080],"summary":"The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.","verified":false},"CVE-2016-5387":{"cvss":6.8,"ports":[9080],"summary":"The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. NOTE: the vendor states \"This mitigation has been assigned the identifier CVE-2016-5387\"; in other words, this is not a CVE ID for a vulnerability.","verified":false},"CVE-2016-5114":{"cvss":6.4,"ports":[9080],"summary":"sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.","verified":false},"CVE-2016-5096":{"cvss":7.5,"ports":[9080],"summary":"Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.","verified":false},"CVE-2016-5095":{"cvss":7.5,"ports":[9080],"summary":"Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.","verified":false},"CVE-2016-5094":{"cvss":7.5,"ports":[9080],"summary":"Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.","verified":false},"CVE-2016-5093":{"cvss":7.5,"ports":[9080],"summary":"The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.","verified":false},"CVE-2016-4975":{"cvss":4.3,"ports":[9080],"summary":"Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).","verified":false},"CVE-2016-4543":{"cvss":7.5,"ports":[9080],"summary":"The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.","verified":false},"CVE-2016-4542":{"cvss":7.5,"ports":[9080],"summary":"The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.","verified":false},"CVE-2016-4541":{"cvss":7.5,"ports":[9080],"summary":"The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.","verified":false},"CVE-2016-4540":{"cvss":7.5,"ports":[9080],"summary":"The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.","verified":false},"CVE-2016-4539":{"cvss":7.5,"ports":[9080],"summary":"The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.","verified":false},"CVE-2016-4538":{"cvss":7.5,"ports":[9080],"summary":"The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.","verified":false},"CVE-2016-4537":{"cvss":7.5,"ports":[9080],"summary":"The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.","verified":false},"CVE-2016-4343":{"cvss":6.8,"ports":[9080],"summary":"The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive.","verified":false},"CVE-2016-4342":{"cvss":8.3,"ports":[9080],"summary":"ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.","verified":false},"CVE-2016-4070":{"cvss":5.0,"ports":[9080],"summary":"Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says \"Not sure if this qualifies as security issue (probably not).","verified":false},"CVE-2016-3185":{"cvss":6.4,"ports":[9080],"summary":"The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.","verified":false},"CVE-2016-3171":{"cvss":6.8,"ports":[9080],"summary":"Drupal 6.x before 6.38, when used with PHP before 5.4.45, 5.5.x before 5.5.29, or 5.6.x before 5.6.13, might allow remote attackers to execute arbitrary code via vectors related to session data truncation.","verified":false},"CVE-2016-3142":{"cvss":6.4,"ports":[9080],"summary":"The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\\x05\\x06 signature at an invalid location.","verified":false},"CVE-2016-3141":{"cvss":7.5,"ports":[9080],"summary":"Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.","verified":false},"CVE-2016-2554":{"cvss":10.0,"ports":[9080],"summary":"Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.","verified":false},"CVE-2016-2161":{"cvss":5.0,"ports":[9080],"summary":"In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.","verified":false},"CVE-2016-1903":{"cvss":6.4,"ports":[9080],"summary":"The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate function.","verified":false},"CVE-2016-0736":{"cvss":5.0,"ports":[9080],"summary":"In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.","verified":false},"CVE-2015-9253":{"cvss":6.8,"ports":[9080],"summary":"An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.","verified":false},"CVE-2015-9251":{"cvss":4.3,"ports":[88,4433,9080,50070],"summary":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","verified":false},"CVE-2015-8994":{"cvss":6.8,"ports":[9080],"summary":"An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode (\"opcode\" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these scenarios, the default Zend OpCache behavior defeats script file permissions by sharing a single SHM cache among all child PHP processes. PHP scripts often contain sensitive information: Think of CMS configurations where reading or running another user's script usually means gaining privileges to the CMS database.","verified":false},"CVE-2015-8935":{"cvss":4.3,"ports":[9080],"summary":"The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 supports deprecated line folding without considering browser compatibility, which allows remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer by leveraging (1) %0A%20 or (2) %0D%0A%20 mishandling in the header function.","verified":false},"CVE-2015-8879":{"cvss":5.0,"ports":[9080],"summary":"The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.","verified":false},"CVE-2015-8877":{"cvss":5.0,"ports":[9080],"summary":"The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.","verified":false},"CVE-2015-8876":{"cvss":7.5,"ports":[9080],"summary":"Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.","verified":false},"CVE-2015-8874":{"cvss":5.0,"ports":[9080],"summary":"Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.","verified":false},"CVE-2015-8873":{"cvss":5.0,"ports":[9080],"summary":"Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial