174.138.31.222

Regular View Raw Data
Last Seen: 2024-05-17

GeneralInformation

Hostnames itstore.vipme.my.id
Domains vipme.my.id 
Cloud Provider DigitalOcean
Cloud Region sg-05
Country Singapore
City Singapore
Organization DigitalOcean, LLC
ISP DigitalOcean, LLC
ASN AS14061

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 6.8A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2019-9516 6.8Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.
CVE-2019-9513 7.8Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
CVE-2019-9511 7.8Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
CVE-2019-20372 4.3NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
CVE-2018-16845 5.8nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
790797838 | 2024-05-14T22:41:25.321613
  
22 / tcp
-401854392 | 2024-05-02T21:57:03.050075
  
80 / tcp
-28792913 | 2024-04-17T19:59:56.326551
  
143 / tcp
0 | 2024-05-09T04:55:05.540474
  
311 / tcp
790797838 | 2024-05-07T04:04:25.239880
  
389 / tcp
0 | 2024-05-17T01:30:36.916487
  
443 / tcp
0 | 2024-05-13T14:18:36.270438
  
444 / tcp
790797838 | 2024-05-05T12:07:03.942980
  
445 / tcp
790797838 | 2024-04-19T15:11:49.913600
  
450 / tcp
790797838 | 2024-05-07T23:49:26.025170
  
502 / tcp
790797838 | 2024-05-08T02:41:49.379654
  
503 / tcp
790797838 | 2024-05-09T22:25:41.189563
  
515 / tcp
790797838 | 2024-04-22T11:52:13.852546
  
548 / tcp
790797838 | 2024-05-11T17:46:10.080558
  
554 / tcp
790797838 | 2024-05-09T15:40:37.126438
  
587 / tcp
396189392 | 2024-05-16T16:40:52.427349
  
593 / tcp
790797838 | 2024-05-01T06:20:41.296722
  
631 / tcp
-1904029431 | 2024-05-12T23:46:07.891625
  
636 / tcp
790797838 | 2024-05-09T13:17:36.158094
  
646 / tcp
790797838 | 2024-04-26T01:29:45.138587
  
666 / tcp
790797838 | 2024-04-23T03:25:50.567302
  
771 / tcp
790797838 | 2024-05-13T08:15:54.625917
  
873 / tcp
396189392 | 2024-05-08T06:24:06.405490
  
902 / tcp
790797838 | 2024-05-15T06:42:12.327021
  
992 / tcp
790797838 | 2024-05-14T08:43:54.528760
  
993 / tcp
396189392 | 2024-04-20T07:15:32.284870
  
1000 / tcp
-983683948 | 2024-04-28T02:18:11.083030
  
2082 / tcp
790797838 | 2024-05-13T18:25:57.907439
  
2222 / tcp
-983683948 | 2024-05-08T16:57:00.581666
  
8443 / tcp



Contact Us

Shodan ® - All rights reserved