125.66.152.250

Regular View Raw Data
Last Seen: 2024-05-16
Tags:
eol-product

GeneralInformation

Hostnames 250.152.66.125.broad.zg.sc.dynamic.163data.com.cn
eye.scxs.vip
Domains 163data.com.cn scxs.vip 
Country China
City Zigong
Organization CHINANET Sichuan province network
ISP CHINANET-BACKBONE
ASN AS4134

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 6.8A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2019-20372 4.3NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
CVE-2014-4078 5.1The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the "IP Address and Domain Restrictions" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka "IIS Security Feature Bypass Vulnerability."
1833483857 | 2024-05-16T11:51:08.516883
  
22 / tcp
1090556630 | 2024-05-05T11:25:24.455190
  
123 / udp
1392963914 | 2024-05-12T05:48:03.761639
  
161 / udp
1637199859 | 2024-05-08T20:50:39.673281
  
8001 / tcp
1129566825 | 2024-05-15T07:00:45.455625
  
8081 / tcp
950481880 | 2024-05-02T21:35:11.499556
  
8082 / tcp
199333125 | 2024-05-09T12:43:34.261869
  
8090 / tcp
-2006314276 | 2024-05-01T10:43:07.366617
  
8443 / tcp
-620423611 | 2024-05-08T05:37:14.589279
  
9100 / tcp
478582004 | 2024-05-06T09:21:46.993565
  
9101 / tcp



Contact Us

Shodan ® - All rights reserved