78.40.104.10

Regular View Raw Data History
Last Seen: 2022-05-25

GeneralInformation

Country Georgia
City Tbilisi
Organization LLC Skytel
ISP LLC Skytel
ASN AS49628

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2016-8612 Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.
CVE-2014-0231 The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
CVE-2017-7679 In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
CVE-2013-2249 mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
CVE-2016-4975 Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
CVE-2017-3167 In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
CVE-2018-1312 In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
CVE-2013-6438 The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
CVE-2017-7668 The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
CVE-2017-3169 In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
CVE-2014-0098 The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
1993462962 | 2022-05-25T17:47:45.179585
        
80 / tcp
1400196417 | 2022-05-19T08:20:56.214006
        
82 / tcp
-370724244 | 2022-05-19T15:46:55.079615
        
88 / tcp
1400196417 | 2022-05-14T23:19:33.461924
        
104 / tcp
48661938 | 2022-05-15T18:30:27.056011
        
1024 / tcp
48661938 | 2022-05-16T00:22:48.264842
        
1026 / tcp
48661938 | 2022-05-10T16:22:02.683332
        
1050 / tcp
-1538260461 | 2022-05-13T22:44:23.768088
        
2000 / tcp
1400196417 | 2022-05-01T19:44:20.499365
        
2002 / tcp
1400196417 | 2022-05-18T00:55:15.439384
        
5577 / tcp
-714702940 | 2022-05-12T15:21:59.823769
        
7071 / tcp
1400196417 | 2022-05-13T09:41:48.512415
        
8047 / tcp
1400196417 | 2022-05-25T01:29:25.486187
        
8099 / tcp
48661938 | 2022-05-23T21:20:58.037809
        
8143 / tcp
48661938 | 2022-05-05T16:13:16.522237
        
8553 / tcp
-370724244 | 2022-05-01T12:47:37.159322
        
8803 / tcp
48661938 | 2022-05-21T07:15:10.237581
        
8832 / tcp
48661938 | 2022-05-24T05:58:36.857887
        
8860 / tcp
1400196417 | 2022-05-20T22:11:15.544743
        
8872 / tcp
730508685 | 2022-05-20T06:05:43.639551
        
44158 / tcp



Contact Us

Shodan ® - All rights reserved