91.239.26.164

Regular View Raw Data
Last Seen: 2024-06-13
Tags:
eol-product

GeneralInformation

Hostnames ddiv.ru
www.ddiv.ru
91-239-26-164.flops.ru
Domains ddiv.ru flops.ru 
Country Russian Federation
City Moscow
Organization Serveroid, LLC
ISP Serveroid, LLC
ASN AS199274
Operating System Debian

WebTechnologies

CMS
JavaScript frameworks
JavaScript libraries
Programming languages
UI frameworks
Web frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

OpenPorts

2143744000 | 2024-05-26T11:25:35.552850
  
21 / tcp
1976528500 | 2024-06-13T10:27:25.228588
  
22 / tcp
646435191 | 2024-06-09T01:13:21.058993
  
80 / tcp
-491973294 | 2024-06-10T12:59:01.079639
  
111 / tcp
1976456039 | 2024-05-21T23:46:29.974527
  
111 / udp
-1310044912 | 2024-06-06T15:46:43.531019
  
123 / udp
1666634885 | 2024-06-12T07:21:57.478798
  
443 / tcp



Contact Us

Shodan ® - All rights reserved

\", which results in the enclosed script logic to be executed.","verified":false},"CVE-2019-20372":{"cvss":4.3,"ports":[80,443],"summary":"NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.","verified":false},"CVE-2019-11358":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","verified":false},"CVE-2018-16845":{"cvss":5.8,"ports":[80,443],"summary":"nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.","verified":false},"CVE-2017-20005":{"cvss":7.5,"ports":[80,443],"summary":"NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.","verified":false},"CVE-2017-7529":{"cvss":5.0,"ports":[80,443],"summary":"Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.","verified":false},"CVE-2016-1247":{"cvss":7.2,"ports":[80,443],"summary":"The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.","verified":false},"CVE-2016-0747":{"cvss":5.0,"ports":[80,443],"summary":"The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.","verified":false},"CVE-2016-0746":{"cvss":7.5,"ports":[80,443],"summary":"Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.","verified":false},"CVE-2016-0742":{"cvss":5.0,"ports":[80,443],"summary":"The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.","verified":false},"CVE-2015-9251":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","verified":false},"CVE-2014-3616":{"cvss":4.3,"ports":[80,443],"summary":"nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct \"virtual host confusion\" attacks.","verified":false},"CVE-2013-4547":{"cvss":7.5,"ports":[80,443],"summary":"nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.","verified":false},"CVE-2013-2070":{"cvss":5.8,"ports":[80,443],"summary":"http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.","verified":false},"CVE-2013-0337":{"cvss":7.5,"ports":[80,443],"summary":"The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.","verified":false},"CVE-2012-6708":{"cvss":4.3,"ports":[443],"summary":"jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.","verified":false}}; setupBannerCve(); setupVulns(VULNS); })();