91.199.118.184

Regular View Raw Data
Last Seen: 2024-05-03
Tags:
eol-product

GeneralInformation

Hostnames fra.speedtest.clouvider.net
c045d2dqjy2-8uyakfjuccoljdh36-v47cbcxbc1w8hj84t1t82sr.wifiman.me
Domains clouvider.net wifiman.me 
Country Germany
City Frankfurt am Main
Organization Clouvider Limited
ISP Clouvider
ASN AS62240
Operating System Ubuntu

SecurityContact

Contact https://www.clouvider.com/contact/
Expires 2028-12-01T23:59:00.000Z
Preferred-Languages en

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 6.8A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
-1988090511 | 2024-04-27T12:19:48.389379
  
22 / tcp
-1188207445 | 2024-05-03T03:45:54.972633
  
80 / tcp
-116366914 | 2024-05-03T08:55:35.628553
  
443 / tcp
624004002 | 2024-05-02T01:13:45.164635
  
5201 / tcp
1393880461 | 2024-05-03T05:17:50.731160
  
8080 / tcp
1254423774 | 2024-05-01T00:21:09.130562
  
8081 / tcp



Contact Us

Shodan ® - All rights reserved