110.40.25.189

Regular View Raw Data
Last Seen: 2024-05-28

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-46118 RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an "out-of-memory killer"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.
CVE-2022-31008 RabbitMQ is a multi-protocol messaging and streaming broker. In affected versions the shovel and federation plugins perform URI obfuscation in their worker (link) state. The encryption key used to encrypt the URI was seeded with a predictable secret. This means that in case of certain exceptions related to Shovel and Federation plugins, reasonably easily deobfuscatable data could appear in the node log. Patched versions correctly use a cluster-wide secret for that purpose. This issue has been addressed and Patched versions: `3.10.2`, `3.9.18`, `3.8.32` are available. Users unable to upgrade should disable the Shovel and Federation plugins.
1377938449 | 2024-05-16T18:49:32.818498
  
22 / tcp
1586701112 | 2024-05-24T04:13:01.108663
  
3306 / tcp
1913291440 | 2024-05-09T19:47:02.782831
  
4369 / tcp
-268271615 | 2024-05-09T00:00:48.500748
  
5672 / tcp
1410193794 | 2024-05-08T03:03:37.137872
  
8080 / tcp
1544091383 | 2024-05-04T14:27:13.562646
  
8081 / tcp
112246764 | 2024-05-09T05:25:35.304702
  
9999 / tcp
112246764 | 2024-05-28T15:11:10.152817
  
18081 / tcp



Contact Us

Shodan ® - All rights reserved