85.214.146.50

Regular View Raw Data
Last Seen: 2024-05-06

GeneralInformation

Hostnames desarrolloxml.com
www.desarrolloxml.com
h2961674.stratoserver.net
Domains desarrolloxml.com stratoserver.net 
Country Germany
City Berlin
Organization Strato Rechenzentrum, Berlin
ISP Strato AG
ASN AS6724

WebTechnologies

JavaScript frameworks
JavaScript libraries
Miscellaneous
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2024-23897 7.5Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
CVE-2020-1938 7.5When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible.
-961863635 | 2024-04-26T18:21:26.691183
  
21 / tcp
-818427953 | 2024-04-27T01:57:41.760593
  
22 / tcp
1127391786 | 2024-05-06T07:45:45.965799
  
25 / tcp
2042676629 | 2024-04-23T11:13:49.516834
  
80 / tcp
1628233607 | 2024-05-04T20:21:03.569308
  
110 / tcp
-127552878 | 2024-05-03T13:54:23.446694
  
143 / tcp
399895680 | 2024-05-04T22:55:46.609366
  
443 / tcp
-268623704 | 2024-05-01T07:25:52.846705
  
465 / tcp
-628402902 | 2024-05-06T00:27:22.249997
  
993 / tcp
1469962204 | 2024-04-16T11:45:03.335906
  
995 / tcp
-1702254260 | 2024-04-22T03:06:08.946872
  
3306 / tcp
-16333647 | 2024-05-05T03:39:47.437131
  
8009 / tcp
474347020 | 2024-04-30T21:32:56.592857
  
8069 / tcp
-567194451 | 2024-04-28T10:22:30.982219
  
8080 / tcp
367748420 | 2024-05-02T20:16:42.326038
  
8083 / tcp
474394065 | 2024-05-05T16:01:55.394323
  
8085 / tcp
1826528925 | 2024-04-19T02:28:05.040382
  
8087 / tcp
-1759613682 | 2024-05-03T21:06:56.622443
  
8443 / tcp
-754605597 | 2024-05-06T06:22:27.008686
  
8880 / tcp



Contact Us

Shodan ® - All rights reserved