Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname www.nationalistwomensfront.org ISP GoDaddy.com, LLC
- Continent North America Flag
- US
- Country United States Country Code US
- Region Arizona Local time 22 Oct 2019 10:17 MST
- City Scottsdale Postal Code 85260
- IP Address 160.153.136.3 Latitude 33.601
- Longitude -111.887
- =======================================================================================================================================
- #######################################################################################################################################
- > www.nationalistwomensfront.org
- Server: 185.93.180.131
- Address: 185.93.180.131#53
- Non-authoritative answer:
- www.nationalistwomensfront.org canonical name = nationalistwomensfront.org.
- Name: nationalistwomensfront.org
- Address: 160.153.136.3
- >
- #######################################################################################################################################
- Domain Name: NATIONALISTWOMENSFRONT.ORG
- Registry Domain ID: D402200000000428464-LROR
- Registrar WHOIS Server: whois.godaddy.com
- Registrar URL: http://www.whois.godaddy.com
- Updated Date: 2018-11-02T14:13:16Z
- Creation Date: 2016-10-30T20:59:50Z
- Registry Expiry Date: 2019-10-30T20:59:50Z
- Registrar Registration Expiration Date:
- Registrar: GoDaddy.com, LLC
- Registrar IANA ID: 146
- Registrar Abuse Contact Email: abuse@godaddy.com
- Registrar Abuse Contact Phone: +1.4806242505
- Reseller:
- Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
- Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
- Registrant Organization: Domains By Proxy, LLC
- Registrant State/Province: Arizona
- Registrant Country: US
- Name Server: NS57.DOMAINCONTROL.COM
- Name Server: NS58.DOMAINCONTROL.COM
- DNSSEC: unsigned
- #######################################################################################################################################
- [+] Target : www.nationalistwomensfront.org
- [+] IP Address : 160.153.136.3
- [+] Headers :
- [+] Link : <http://www.nationalistwomensfront.org/site.css?v=>; rel=preload; as=style,<https://fonts.googleapis.com>; rel=preconnect; crossorigin,<https://fonts.gstatic.com>; rel=preconnect; crossorigin,<https://img1.wsimg.com>; rel=preconnect; crossorigin,<https://img2.wsimg.com>; rel=preconnect; crossorigin,<https://img4.wsimg.com>; rel=preconnect; crossorigin,<http://img4.wsimg.com>; rel=preconnect; crossorigin,<http://nebula.wsimg.com>; rel=preconnect; crossorigin
- [+] Cache-Control : public, max-age=60, s-maxage=300
- [+] Content-Security-Policy : frame-ancestors 'self'
- [+] Content-Type : text/html; charset=utf-8
- [+] Vary : Accept-Encoding
- [+] Content-Encoding : gzip
- [+] Server : DPS/1.6.13
- [+] X-SiteId : 4000
- [+] Set-Cookie : dps_site_id=4000; path=/
- [+] ETag : 2533d89302079c16f08a4ca667c29a4f
- [+] Date : Tue, 22 Oct 2019 17:32:58 GMT
- [+] Connection : keep-alive
- [+] Transfer-Encoding : chunked
- [+] SSL Certificate Information :
- [+] organizationalUnitName : Domain Control Validated
- [+] commonName : *.godaddysites.com
- [+] countryName : US
- [+] stateOrProvinceName : Arizona
- [+] localityName : Scottsdale
- [+] organizationName : GoDaddy.com, Inc.
- [+] organizationalUnitName : http://certs.godaddy.com/repository/
- [+] commonName : Go Daddy Secure Certificate Authority - G2
- [+] Version : 3
- [+] Serial Number : DE69C852CBDFD8E1
- [+] Not Before : Aug 3 16:00:21 2018 GMT
- [+] Not After : Aug 3 16:00:21 2020 GMT
- [+] OCSP : ('http://ocsp.godaddy.com/',)
- [+] subject Alt Name : (('DNS', '*.godaddysites.com'), ('DNS', 'godaddysites.com'))
- [+] CA Issuers : ('http://certificates.godaddy.com/repository/gdig2.crt',)
- [+] CRL Distribution Points : ('http://crl.godaddy.com/gdig2s1-854.crl',)
- [+] Whois Lookup :
- [+] NIR : None
- [+] ASN Registry : arin
- [+] ASN : 26496
- [+] ASN CIDR : 160.153.136.0/22
- [+] ASN Country Code : US
- [+] ASN Date : 2011-09-01
- [+] ASN Description : AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US
- [+] cidr : 160.153.0.0/16
- [+] name : GO-DADDY-COM-LLC
- [+] handle : NET-160-153-0-0-1
- [+] range : 160.153.0.0 - 160.153.255.255
- [+] description : GoDaddy.com, LLC
- [+] country : US
- [+] state : AZ
- [+] city : Scottsdale
- [+] address : 14455 N Hayden Road
- Suite 226
- [+] postal_code : 85260
- [+] emails : ['abuse@godaddy.com', 'noc@godaddy.com']
- [+] created : 2011-08-31
- [+] updated : 2014-02-25
- [+] Crawling Target...
- [+] Looking for robots.txt........[ Found ]
- [+] Extracting robots Links.......[ 15 ]
- [+] Looking for sitemap.xml.......[ Found ]
- [+] Extracting sitemap Links......[ 2 ]
- [+] Extracting CSS Links..........[ 1 ]
- [+] Extracting Javascript Links...[ 3 ]
- [+] Extracting Internal Links.....[ 0 ]
- [+] Extracting External Links.....[ 1 ]
- [+] Extracting Images.............[ 6 ]
- [+] Total Links Extracted : 28
- [+] Dumping Links in /opt/FinalRecon/dumps/www.nationalistwomensfront.org.dump
- [+] Completed!
- #######################################################################################################################################
- [+] Starting At 2019-10-22 13:33:22.798915
- [+] Collecting Information On: http://www.nationalistwomensfront.org/
- [#] Status: 200
- --------------------------------------------------
- [#] Web Server Detected: DPS/1.6.13
- [!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
- - Link: <http://www.nationalistwomensfront.org/site.css?v=>; rel=preload; as=style,<https://fonts.googleapis.com>; rel=preconnect; crossorigin,<https://fonts.gstatic.com>; rel=preconnect; crossorigin,<https://img1.wsimg.com>; rel=preconnect; crossorigin,<https://img2.wsimg.com>; rel=preconnect; crossorigin,<https://img4.wsimg.com>; rel=preconnect; crossorigin,<http://img4.wsimg.com>; rel=preconnect; crossorigin,<http://nebula.wsimg.com>; rel=preconnect; crossorigin
- - Cache-Control: public, max-age=60, s-maxage=300
- - Content-Security-Policy: frame-ancestors 'self'
- - Content-Type: text/html; charset=utf-8
- - Vary: Accept-Encoding
- - Content-Encoding: gzip
- - Server: DPS/1.6.13
- - X-SiteId: 4000
- - Set-Cookie: dps_site_id=4000; path=/
- - ETag: 2533d89302079c16f08a4ca667c29a4f
- - Date: Tue, 22 Oct 2019 17:33:23 GMT
- - Connection: keep-alive
- - Transfer-Encoding: chunked
- --------------------------------------------------
- [#] Finding Location..!
- [#] status: success
- [#] country: Netherlands
- [#] countryCode: NL
- [#] region: NH
- [#] regionName: North Holland
- [#] city: Amsterdam
- [#] zip: 1012
- [#] lat: 52.3702
- [#] lon: 4.89517
- [#] timezone: Europe/Amsterdam
- [#] isp: GoDaddy.com, LLC
- [#] org: GoDaddy.com, LLC
- [#] as: AS26496 GoDaddy.com, LLC
- [#] query: 160.153.136.3
- --------------------------------------------------
- [x] Didn't Detect WAF Presence on: http://www.nationalistwomensfront.org/
- --------------------------------------------------
- [#] Starting Reverse DNS
- [!] Found 1000 any Domain
- - 00k9.com
- - 1000mothers.org
- - 100prooftattoo.com
- - 107auctionblock.com
- - 109howard.com
- - 1180wfyl.com
- - 123deliveryservices.com
- - 12oclocklevel.com
- - 13thintconflimbdevregen.com
- - 156metal.com
- - 16ways.org
- - 1nailsalon.com
- - 1nationalexec.com
- - 1nightstandstl.com
- - 1stlutheranchurch.org
- - 1stmaple.org
- - 1timefence.com
- - 205westwacker.com
- - 206photography.com
- - 24-7towtruckservice.com
- - 2gs.me
- - 2jsoap.com
- - 39gorkhas.com
- - 3horsespaydirts.com
- - 401ads.com
- - 4cbbq.com
- - 5skate.com
- - 601protech.com
- - 7111317192329.com
- - 7dayhealth.com
- - a-1base.com
- - a1escortsinpune.com
- - a1mconsulting.co.uk
- - a1oshasafety.com
- - a1signworks.com
- - a1southerntrappers.com
- - aardvarkpestsolutionsllc.com
- - aarvaa.com
- - abandoforcs.com
- - abhinavtechcorp.com
- - abigaillaurentravel.com
- - abingtonhandymanservices.com
- - abinstallations.com.au
- - abrandtfineart.com
- - abroadwaysmile.com
- - acbouquets.com
- - accentpowdercoating.com
- - acreen.net
- - adaptivecloudnet.com
- - addabrewpub.com
- - adrienneeichner.com
- - adsx.com
- - advancedjourneychauffeuring.co.uk
- - advancedperfusion.com
- - advbiz.com
- - affymax.com
- - aflatoonz.com
- - afreechatline.com
- - agewithgraceseniorcare.com
- - agnursery.com
- - ahillsmc.com
- - aikidoofnorthampton.org
- - airtestingsw.com
- - airwolfenergy.com
- - aitstravel.com
- - akashshukla.in
- - akawardogs.net
- - akelco.com.ph
- - albrittoncustomcarpentry.com
- - alduwaliya.com
- - alecrodriguez.com
- - alexitalianrestaurant.com
- - alfacomputer.in
- - alfaizelectric.com
- - alfordburkhart.com
- - all-absorb.com
- - all4cars.co.uk
- - alleyabstract.com
- - allhomeservices.co
- - allmightyaffiliates.com
- - allseasonsfirewoods.com
- - alohagentleenergy.com
- - alpamayo.cl
- - altamiradeco.com
- - alternus-capital.com
- - alxandrphoto.com
- - amckean.com
- - americangemologicalappraisal.com
- - americanpizzapattaya.com
- - amochange.com
- - amormn.com
- - amoselectrical.co.uk
- - amptrailers.com
- - amritatravels.in
- - amygreenhealthcarerecruiting.com
- - anabellebryant.com
- - anallies-this.com
- - anaturalallure.com
- - anchormarineinc.net
- - anchorrarecoins.com
- - andtelevision.com
- - anexonel.com
- - angelaboyddyson.com
- - angelscript.com
- - angieslinks.com
- - animalsinneedri.com
- - aniplazahotel.am
- - anjum.co.in
- - ankitakundu.com
- - annafaithxoxo.com
- - annfrank.net
- - antarveditourism.com
- - antihangover.com
- - antinorodocs.com
- - anuriti.com
- - apastmemory.com
- - appinratlam.com
- - appsport.com
- - apurvadentalcare.com
- - arbitrageshub.net
- - arizonanaturalmedicalcenter.com
- - arjunarchana.com
- - arquiview.com
- - arshaknazarian.com
- - asimant.cl
- - asphaltsitework.com
- - astucefifa17fr.com
- - asylumskatepark.co.uk
- - ataxadvisor.com
- - atlasexcavating.com
- - atomix.com
- - atticarch.com
- - attorneytonywadhawan.com
- - atyourrequestdj.net
- - auntiemaescafe.com
- - auralearmt.com
- - austincoc.com
- - autobodyworkscollision.com
- - autodiagalgerie.com
- - automotivetestdrivers.com
- - autumnbriphotography.com
- - averityteam.com
- - avonleashea.com
- - azbeekeepers.org
- - azcpoa.org
- - bacaresevilla.com
- - balancefindyourcenter.com
- - ballparkent.com
- - bandahuellas.cl
- - bandc4.net
- - bandlergroup.com
- - bangalorebusiness.com
- - banterandbet.net
- - barbaresconcrete.com
- - barnbuiltcaferacer.com
- - batterymasters.com
- - beacondlites.com
- - bebparcodelbrik.com
- - beehiveconcretepumping.com
- - beewired.co.uk
- - bellingarpacking.com
- - bergmanlawfirm.net
- - berlinica.com
- - bernardobeiriz.com
- - berniefacts.com
- - bestattorneysofamerica.com
- - bestfriendsofbaker.org
- - bestinrenovation.com
- - bestlosangelesmattresssale.com
- - betafulmind.com
- - beveragestockreview.com
- - beydabilgisayar.com
- - beyondvacations.in
- - bhaibrothers.com
- - bigbasschallengecanada.com
- - bigbearspecialevents.com
- - biocidejansan.com
- - bioonega.com
- - bioonejacksonville.com
- - birgonul.org
- - bitdoublebtc.com
- - bizconfo.com
- - bizprofit.net
- - bizshotz360.com
- - blankbanshee.com
- - blizzfiles.com
- - bluewhalefunding.com
- - bobbystromfitness.com
- - bobliekens.com
- - bodyrubschicago.com
- - bohemiananchor.com
- - borsteinsheinbaum.com
- - bounceonpueblo.com
- - brandonchao.com
- - brcowboychurch.org
- - brevardfun.com
- - briajungwirth.com
- - brianhalstead.net
- - brickadvantage.com
- - bridgesdvc.org
- - brighten.ai
- - brinsured.com
- - bro23.com
- - browardski.com
- - bruusa.com
- - buddyblackattack.com
- - buildingstore.cl
- - bulksms2mobile.co.in
- - bullshirepolice.com
- - cabinetplace.net
- - cableliquidator.com
- - cablesmashers.com
- - cabsecgovt.in
- - cainelectricstl.com
- - californiahomeschoolsports.com
- - callsupportline.com
- - canadianonshore.com
- - canar.net
- - candoo.club
- - cannon.pe
- - canoraweaving.com
- - capitolomaha.com
- - carsontechgroup.com
- - casamiaservices.com
- - casanovainfo.com
- - casoconstruction.com
- - catersolar.com
- - cbd-canada.net
- - ccmotorcycletraining.com
- - centrestar.ca
- - ceragence.com
- - cetinarik.org
- - cghub.com
- - cgl-worldwide.com
- - champsforchildren.com
- - chapmansupplies.ca
- - chelseafw.com
- - chelseahewittphotography.com
- - chemchasers.com
- - chennaifurniture.net
- - chennaiorganicfarm.com
- - chesapeakespeedskating.com
- - chesterfieldfamilydentistry.com
- - chesterlimonj.com
- - chickenfiesta.com
- - chihebspoiledboy.com
- - chinanet.com
- - chocohouse.biz
- - chriscoylandscapes.com
- - chriskerfootpainteranddecorator.co.uk
- - christianleievents.com
- - christinefanderson.com
- - christinein16.com
- - christineproiasdance.com
- - cignaltv.ph
- - cinnamonsorganizing.com
- - ciprian-ciubotariu.com
- - ckwoodworking.com
- - claros.com
- - clashroyalehackcheats.com
- - click9999.com
- - clinicavidanimal.cl
- - clinusa.com
- - cloverleafcloud.com
- - cmldigital.com.mx
- - coalitionforqualitypubliceducation.com
- - colchesterremovals.co
- - collegiatesmg.com
- - collinghamchambers.com
- - collinsproscapes.com
- - comiskeyresearch.com
- - comparefroggy.com
- - comparemypremiums.com
- - comradeayatollah.org
- - constableclintburgess.com
- - construtoramilao.com
- - consultip.godaddysites.com
- - copperleafeventcenter.com
- - copskc.com
- - corporateinsight.biz
- - cottontailindustries.com
- - covertlogistics.com
- - cpli.com
- - cpqgvnlt.com
- - creativeeducationfoundation.org
- - croxdaleinn.co.uk
- - crucontractors.co.uk
- - cruisepark.com
- - crystalbluediving.com
- - crystalrootsec.com
- - ctdstaffing.com
- - ctrust.ca
- - cuddlr.mobi
- - culpepper-club.com
- - cursosdeexcel.com.mx
- - custommen.com
- - cwicrane.com
- - cyberhawkwsa.com
- - daaceswild.com
- - danaabukhader.com
- - danaalotaibi.com
- - dancetonightatlanta.com
- - dangreenblatt.info
- - danterestorations.com
- - datacity.ca
- - datamarketindia.com
- - davispattesting.co.uk
- - dawnwillow.com
- - dccamerica.com
- - dcunlimited.co
- - deepakdahiya.in
- - defb.org
- - delawarevalleyhomemaintenance.com
- - delicatetips.com
- - deltaglobal.com
- - depor13news.com
- - dermotmurnaghan.com
- - desketing.com.au
- - destecheng.com
- - dgacapitalmanagement.com
- - dgeconsulting.cl
- - dgkw.com
- - dhanus.cl
- - digg.comwww.cantonmuseum.org
- - digicurb.com
- - digitalflex.in
- - dimapurpolice.in
- - dimensiontrust.cl
- - directnet.biz
- - distinguishedpaintingcontractor.com
- - divfingrp.com
- - divinecabinets.com
- - divinecaddesign.com
- - dj-homes.com
- - dnaconsultores.cl
- - docksidepower.com
- - dosaplace.in
- - dotmisr.com
- - dreamawayresorts.com
- - dreyandvic.com
- - drskiskids.com
- - drsoot.co.uk
- - drytimerestoration.com
- - drywall911.com
- - dtcfamilyhealth.com
- - dteamnetwork.com
- - duoseg.com
- - e-varmis.com
- - ealar.org
- - easingpaw.com
- - eastasiawine.com
- - eastcoastmoviehorses.com
- - eastlouisvilletreeservice.com
- - eastplat.com
- - easynetkerala.com
- - ecmne.com
- - economicfrauds.tv
- - edephoto.com
- - edgewaterenergysc.com
- - edmunsonelectric.com
- - edwardslegaloffice.com
- - eeea.com
- - electricalgenerators.co.uk
- - eleganthomesoftexas.com
- - elfisannidhi.com
- - elisadeath.com
- - eliteautopartsaz.com
- - elitelashstudioaz.com
- - elliscountymartialarts.com
- - elpasohomestexas.com
- - emailabilities.com
- - emanuelcristiancaraman.com
- - emilija1x2.com
- - emilybaoapps.com
- - emirhanguenebakan.com
- - emporiumhairdesigns.com
- - emprendenow.com
- - emrconsultants.com
- - encoreatlanticshoreshoa.com
- - engineerindya.com
- - enlighteningstreams.com
- - enterthecode.in
- - enviadetalle.com
- - eons.com
- - epsdepot.com
- - epyloc.com
- - erikbohlingportfolio.com
- - escapetanandspa.com
- - esselworldlive.in
- - evergreentattoo.com
- - evilagent.com
- - exceedevents.com
- - exmla.com
- - expertstv.com
- - explorer.net
- - expo-pros.com
- - extremepromoting.com
- - eyecandyagency.co.uk
- - eyecandyescort.com
- - falcaogeldimi.com
- - falcohomeimprovements.com.au
- - farmhopethrive.org
- - fast8ballpoolhack.com
- - fastdent.com
- - fenceconsultantsofwashington.com
- - finaconstruction.ca
- - finedine.com.au
- - firstchoicecustomcabinetsllc.com
- - firstposition.cl
- - fkunpadfair.com
- - flmanagementllc.com
- - floridahuntingoutfitter.com
- - flowtechnics.com
- - foltzlawphilly.com
- - foodtruck.com
- - footballpromotions.co.uk
- - footlooseasia.com
- - fortconstructionllc.com
- - free4you.co.uk
- - freedeals.com
- - freedomsolutionsmo.com
- - freeredouan.com
- - fryandpie.com
- - ftp.rugenteam.com
- - fullforcecontracting.net
- - fullstack.com
- - furabodyworks.com
- - fusionsalonnyc.com
- - futurebrightllc.com
- - ga15.info
- - gaganpalacenj.com
- - gainzsupplements.com
- - gama.com
- - gaugeguys.com
- - gaymix365.com
- - geallencastings.co.uk
- - getrealusainc.com
- - getyou.com
- - ggrea.com
- - giftiliciouscards.in
- - girlfridayhull.co.uk
- - givetech.in
- - glassdesignsplus.com
- - glassspecialistsinc.com
- - globaldmsolutions.com
- - globecr.com
- - globestreet.com
- - glossycleaners.com
- - gnselectrical.com
- - goglobalgap.com
- - gogoulet.com
- - goodshepherdpublicschool.in
- - gotascratch.com
- - gotitya.com
- - gpwannabe.com
- - gregoryformissouri.com
- - gregsruntownsend.com
- - griadamlar.com
- - griffithhomeinspection.com
- - grizzlybattle.com
- - gspotautoworks.com
- - gurmevyemekleri.com
- - gurulz.com
- - gururaghavendramatrimony.com
- - gvsigns.ca
- - gymnasiumsf.com
- - handsland.com
- - hanuminteriors.com
- - happiewedding.com
- - happizone.com
- - happyrecharge.info
- - harthomes.us
- - hearttoheartromania.com
- - henrongindustrial.com
- - hescom.in
- - hetroublemaker.me
- - hetzellawoffice.com
- - heytheremorgan.com
- - hfashion.me
- - hhdresearch.com
- - hiddendraftsman.com
- - hidraulicacgchile.cl
- - highcottonhomes.com
- - highlifeasiaweddings.com
- - highstonereflexology.com
- - hilltopsolutions.co.uk
- - hkflavorslimited.com
- - hm-electric.net
- - homecare4eva.co.uk
- - homecomfortsystems.com
- - homelandprotectionservice.com
- - hoododat.com
- - horizon-hosting.co.uk
- - horstschulzeconsulting.com
- - hotelwoodlands.in
- - housetohomeimprovements.com
- - hunterscafesweetwatertn.com
- - hypnotherapistsomerset.com
- - iamdytto.com
- - ibetyoucanbet.com
- - id-queue.com
- - idealimageoc.com
- - idealmedbilling.com
- - idemcevre.com
- - identian.co
- - iheartpaps.org
- - iheesoo.info
- - ihmscanada.com
- - ilikewashington.com
- - imagepix.com
- - imattress.com
- - imperiumlender.com
- - imphysiotherapy.com
- - inceptiontoday.com
- - incsoltech.com
- - industry-platform.com
- - infinitystockpicks.com
- - inglobalservicios.cl
- - innovaterecords.com
- - inpressmedia.net
- - inservic.cl
- - insinc.solutions
- - instakipcin.com
- - interiorsdesignedtx.com
- - internationalwholeseller.com
- - intriguejewelers.net
- - iocircle.com
- - ipcopyright.com
- - iranians4peace.org
- - isccc.org
- - isis-solution.com
- - istanbul-kamera.com
- - isupportbehaviour.com
- - itctool.com
- - itech-learning.com
- - jacksonanthony.co.uk
- - jaguarteam.net
- - jamescolton.co.uk
- - jasmine-thaicuisine.com
- - jasongesing.com
- - jaynagar.in
- - jazzuresorts.com
- - jbandf.com
- - jccaltime.com
- - jcrtechnology.com
- - jcwinn.com
- - jdl.org
- - jdmoling.co.uk
- - jeffmorneau.com
- - jenniferfalk.net
- - jenniferjonesstyling.com
- - jessicapeterson.net
- - ji-cheng.co
- - jjdiamondcleaning.com
- - jlengineering.us
- - jmps.org.in
- - jnanakshi.org
- - joanbeckerlaw.com
- - johnebakerphd.com
- - johnlillie.com
- - jomycaldito.com
- - joshuadobkins.com
- - jrhardwoodfloors.com
- - jrwptruckaccessories.ca
- - justblaze.com
- - justinbloyer.com
- - kalagifts.com
- - kamas-shop.net
- - kamera-sistemleri.co
- - kanevpools.com
- - kannephotographie.com
- - kashmirclick.com
- - katalysttech.com
- - katherine.xxx
- - katiessalon.com
- - katyakandinsky.com
- - kcrp.net
- - kedarhairinc.com
- - keeng.co
- - kellen.com
- - kettlesandgrains.com
- - keyadvisors.cl
- - keystonebusinessconcepts.com
- - khamesalkhanjar.com
- - killelea.net
- - kingscourtgowns.com
- - kingstonpetsitting.com
- - kiralikhackers.com
- - kkkknights.com
- - knowila.com
- - konabbqgrillmat.com
- - kord.com
- - kouroshmi.org
- - kushlyaffiliates.com
- - kuwaittravelexpo.com
- - labicicletasolidaria.cl
- - laexoticsllc.com
- - lakeviewglass.org
- - lamplighterinnclearlake.com
- - latinosfortrump.us
- - laurenalexisshop.com
- - lavozradio.info
- - lawyerinhurghada.com
- - ld-max.com
- - leaders.fitness
- - ledqusa.com
- - leeyastudio.com
- - legendprofile.com
- - legendsplays.com
- - legendsred.com
- - lemongrasshousethailand.com
- - leonhandymanservices.com
- - lessonmy.com
- - level-seven.net
- - leyruta.org
- - lgj.is
- - lifeunleashedacademy.com
- - liftxtense.com
- - limpiezasuperior.cl
- - littlepeoplehawaii.com
- - livetechplus.com
- - loanfundingpros.com
- - localchiromarketing.com
- - localsingles.dating
- - logic-dimensions.com
- - logicaccountshub.com
- - lookatthis.ca
- - loschercheros.com
- - louisrocco.com
- - lovio.co
- - lpathi.com
- - luckieslounge.com
- - luxurylightingandshades.com
- - luxyfan.com
- - lvginc.com
- - lyngift.com
- - magicprofiles.com
- - mail.perfectbosses.com
- - mailhelplol.com
- - mainordlaw.com
- - malloytranscription.com
- - manageitservices.com.au
- - manasa.net.in
- - manhattantms.com
- - mannaplusghana.com
- - manpasandchicago.com
- - mappriceprotection.com
- - markdentalclinic.com
- - martinzarzar.com
- - mash.net
- - masis.org.uk
- - massagecricket.com
- - maxwellandco.net
- - mayahealthinstitute.com
- - mayarcapital.com
- - mcbupdates.com
- - mccn.org
- - mcgintysautoparts.com
- - mcintoshmarketing.biz
- - meadecpa.com
- - medinaguides.com
- - medwinmedicalcenter.com
- - medyumonur.com
- - meghanhardin.com
- - menpoppingtoys.com
- - messagesfromtheangels3.com
- - metalmorphosisdesigns.com
- - meucreditoimoveis.com.br
- - michaelsalem.com
- - michtelco.com
- - mideasttimes.com
- - midnightpm.com
- - mikesprayandsons.co.uk
- - milesbettermedia.com
- - minecraftadresi.com
- - mirshafieilawoffice.com
- - misotroliquique.cl
- - mistresscarol.com
- - mitchellfarm.org
- - mizure.com
- - mmrecharge.com
- - mobile-massage-therapist-london.com
- - moh-lawyer.com
- - momstattoosf.com
- - monicapattonforever.com
- - monsourlawfirm.com
- - montanamac.net
- - montanawild.com
- - mosorsisi.com
- - movingestimates.co
- - movingfirefighter.com
- - mowbetter.net
- - mrdoor.com
- - mrmpoint.com
- - mrsaccidentalmoe.com
- - msdrehouseofshoes.com
- - mtncm.com
- - multiarmazem.com.br
- - multytrade.com
- - munchiesnaturalpetfoods.com
- - mydz.co
- - myeternalart.com
- - myfedloaninfo.org
- - myhomepageguru.com
- - mykennedyhouse.com
- - mynumberbook.com
- - nailartboutiquenyc.com
- - nakedmouse.com
- - nallamittai.com
- - nancykriseman.com
- - nanosistemleri.com
- - narangmandi.com
- - nationalistwomensfront.org
- - nativoinglesbrasilia.com.br
- - nawrasalhalabi.com
- - nc-consultores.cl
- - ncoct.com
- - negativepublicrelations.com
- - netacy.com
- - nettiebay.com
- - newhomesrutherford.com
- - newhousehunters.net
- - newvacancy.com
- - newyorkarchivalprints.com
- - ngrprices.com
- - nicenia.com
- - nickleisgoingunion.com
- - nirmalaenterprise.com
- - noajm.com
- - non-stopgaming.com
- - norcalcrushacademy.com
- - northpointpainting.com
- - nortonhelpline.com
- - nuevodesign.ca
- - nunn-associates.com
- - nurol.cl
- - nurturingnation.org
- - nutrymas.cl
- - nybetsonline.com
- - nyclaserdentist.com
- - o-ghost-hacker.com
- - oasisol.com
- - oceanislefishco.com
- - oceanstatetickcontrol.com
- - oilfieldtls.com
- - okanogannotaryservice.com
- - ola.com
- - oldfashionedfarmersdays.com
- - oluebodacpa.com
- - onedeal4all.com
- - onepay.com
- - onlineprofitjobs.com
- - onukotha.com
- - oopsibabyusa.com
- - optiumcapital.com
- - orangecountyseowebdesign.com
- - orangecrestwolves.org
- - oss-online.com
- - ouramericainitiative.com
- - outlanderthrills.in
- - outreachdallas.org
- - ozasyainsaat.com
- - pacificcoastcoin.com
- - pack401.com
- - pack998.com
- - paintthestarsphoto.com
- - palletfest.com
- - palomafortrump.com
- - panaceainc.co.in
- - pandyalaw.com
- - pantalent.com
- - papaspizzaalaska.com
- - parakeat.com
- - parfummekani.net
- - pasound.com
- - patapp.com
- - pathwaysccs.org
- - patriotwatchmedia.com
- - pay168bet.com
- - paymentsolutionbd.com
- - paystubgroup.com
- - pcnetworx.com
- - pdav.net
- - peakmso1.com
- - pennystockextreme.com
- - perfectfordad.com
- - petesshursavmarkets.com
- - pettraders.com
- - pharslp.com.mx
- - philpenrose.com
- - phoenixgym.in
- - phoenixtherapy.org.uk
- - piquepoloshirts.com
- - planetfry.co
- - planetrackerchicago.com
- - planoequalrights.com
- - playerswap.com
- - poetryclub.com
- - polarforcecreative.com
- - pornsite007.com
- - powermtasolution.com
- - poweruptec.com
- - preciousslut.net
- - predatoroptics.com
- - prerolledcones.ca
- - princesspinky.org
- - printingplusus.com
- - pro-venttech.com
- - prontospanish.com
- - protectingscvalues.com
- - psiconciencia.com
- - psychicloverituals.com
- - publishwithcfa.com
- - puntonsivanhoe.com.au
- - purehcs.co.uk
- - q-flexfitness.com
- - qmm1.com
- - qproofs.com
- - qualityairandcarpet.com
- - quickpicklekit.com
- - quinnlaw.us
- - r-engineering.net
- - r3automation.com
- - rabows.com
- - radiobahiapuerto.com
- - rainbot.xyz
- - raithbyhall.com
- - raleighprimarycare.com
- - rdcconstruction.com
- - realmadridismylife.com
- - reclaim-australia.com
- - redhousecomputers.biz
- - refruitme.co.uk
- - reidcleaning.co.uk
- - relentlesscarpentry.com
- - remazika.co
- - remoteserviceagents.com
- - renfamous.com
- - rentaphotobooth.ca
- - republicanvoterstx.com
- - restackstudios.com
- - rewardpoint.co.uk
- - right-path.co.uk
- - rigworxinc.com
- - riohoteldubai.com
- - ritarivers.com
- - riverviewinsurancesolutions.com
- - ro-bel.com
- - roadbuilderssupply.com
- - robertfl.com
- - robot20.net
- - rockettelecommunications.com
- - rocketwealth.com
- - rockinghamstudio.com
- - romanticreveals.com
- - room.red
- - roraima.cl
- - route66goldenshores.com
- - rsicarolina.com
- - ruthgenevieve.com
- - sacredmystics.com
- - sacredsoulstone.com
- - sadisticsoulsmc.org
- - safemontana.com
- - safesurfing.co
- - safeswimmingschool.com
- - sajidkiani.me
- - salco-sa.com
- - salleepromotions.com
- - salonmanufacturing.com
- - sammoogym.ca
- - santabarbaratraining.com
- - santacruzaleworks.com
- - satfire.com
- - satinpressinc.com
- - savack.com
- - saxhomes.com
- - scholarsinprint.com
- - scottframeandart.com
- - sdfocusgroups.com
- - seacadet.in
- - secondchancenj.com
- - secure-edf.com
- - seguiresa.com
- - seizedbymanhattanda.org
- - selfinafilah.com
- - selfrealisationcoach.com
- - sellamerican.com
- - seller.shoppe.net
- - sellerawards.com
- - servicrane.cl
- - sesmun.com
- - session2019.com
- - setamholdings.com
- - severantos.com
- - sexualdesirez.com
- - sgtpizza.org
- - shanspot.com
- - sherwoodsguns.com
- - shiningdiamondsds.com
- - shivalayjewellers.com
- - shonpeil.com
- - shoppe.net
- - shopperhaven.co
- - shorefirerecordingstudios.com
- - silkytalk.com
- - simonmercs.com
- - simplylavishhair.com
- - singularity3.co.uk
- - sinovic-specialities.com
- - sixlaw.com
- - skillpromoters.co
- - skinterestdayspa.com
- - skydistributors.net
- - skyevents.in
- - sloandds.com
- - smarthomesottawainc.ca
- - smatforms.com
- - smithstock.com
- - snapkik.net
- - socialwavephotobooths.com
- - softwareengineerscommunity.com
- - soldbydebbie.com
- - solidenergysystems.com
- - soonertimesharerelief.com
- - soumyaiyer.com
- - southpostllc.com
- - sparklenc.com
- - speednames.asia
- - splashofsun.com
- - spotstowels.com
- - srigsolutions.com
- - sritechnologyservices.com
- - srvcfee.com
- - ssgc.com
- - ssnhyd.com
- - sstechnoguideking.com
- - stainlesssteelkitchen.com
- - stanfordlorrypark.com
- - starconstructionus.com
- - starvaletparking.in
- - statesservices.org
- - statuselitecds.com
- - stellarcellular.ca
- - steltec.com
- - stephanielevonne.com
- - stjosephmaysville.org
- - stlukespediatrics.com
- - stpatrickselkhorn.org
- - strategicactivism.com
- - strumpet4u.com
- - studio66.tv
- - studioefex.com
- - studiolifefitness.com
- - studiotech.com
- - suitsdistrict.com
- - suncontrol4u.com
- - sunitaverma.in
- - super-service.co.uk
- - supportingcasthc.com
- - supremeaudiovideo.com
- - surfingdata.com
- - survivalistvaults.com
- - swifthairremoval.com
- - sworksmart.com
- - sysplanning.com
- - tahaismail.tv
- - taia.com.mx
- - talismantattoos.com
- - tatkalsoftware.com
- - taxinfo.co
- - taxschool.org.in
- - teamhoustonbaseball.com
- - techiwizard.com
- - tedcruz.com
- - terminusitcorp.com
- - texaslawnservices.com
- - tge.cl
- - thaparmun.com
- - the-olive-orchard.com
- - thebarteltdancers.com
- - thecurioandcandleshop.com
- - thedeskfactory.com
- - thediamondgallery-nc.com
- - thedizzyprincess.com
- - thedolson.com
- - thedrugandalcoholdetoxclinic.com
- - thefishbackteam.com
- - thefitnesshub.in
- - theinnbetween.org
- - thelevelmarket.com
- - theliceclinic.net
- - thelmasmorningcafe.com
- - themanhole.net
- - thepaintshuttle.com
- - theperfectrendezvous411.com
- - therealdebbiedrury.com
- - theredengineer.com
- - theshoeboutique.ca
- - thestockprofiler.com
- --------------------------------------------------
- [!] Scanning Open Port
- [#] 80/tcp open http
- [#] 443/tcp open https
- --------------------------------------------------
- [+] Collecting Information Disclosure!
- [#] Detecting sitemap.xml file
- [!] sitemap.xml File Found: http://www.nationalistwomensfront.org//sitemap.xml
- [#] Detecting robots.txt file
- [!] robots.txt File Found: http://www.nationalistwomensfront.org//robots.txt
- [#] Detecting GNU Mailman
- [-] GNU Mailman App Not Detected!?
- --------------------------------------------------
- [+] Crawling Url Parameter On: http://www.nationalistwomensfront.org/
- --------------------------------------------------
- [#] Searching Html Form !
- [+] Html Form Discovered
- [#] action: https://www.paypal.com/cgi-bin/webscr
- [#] class: None
- [#] id: None
- [#] method: post
- --------------------------------------------------
- [!] Found 1 dom parameter
- [#] http://www.nationalistwomensfront.org//#
- --------------------------------------------------
- [!] 4 Internal Dynamic Parameter Discovered
- [+] http://www.nationalistwomensfront.org////fonts.googleapis.com/css?family=Fredericka+the+Great|Allura|Amatic+SC|Arizonia|Averia+Sans+Libre|Cabin+Sketch|Francois+One|Jacques+Francois+Shadow|Josefin+Slab|Kaushan+Script|Love+Ya+Like+A+Sister|Merriweather|Offside|Open+Sans|Open+Sans+Condensed|Oswald|Over+the+Rainbow|Pacifico|Romanesco|Sacramento|Seaweed+Script|Special+Elite
- [+] http://www.nationalistwomensfront.org////fonts.googleapis.com/css?family=Aldrich
- [+] http://www.nationalistwomensfront.org//site.css?v=
- [+] http://www.nationalistwomensfront.org////nebula.phx3.secureserver.net/6ae72da51a5632cbb163c78fb4e9ab6d?AccessKeyId=E2BBE522AEA0A6EAF06D&disposition=0&alloworigin=1
- --------------------------------------------------
- [-] No external Dynamic Paramter Found!?
- --------------------------------------------------
- [!] 16 Internal links Discovered
- [+] http://www.nationalistwomensfront.org//about.html
- [+] http://www.nationalistwomensfront.org//home.html
- [+] http://www.nationalistwomensfront.org//about.html
- [+] http://www.nationalistwomensfront.org//our-folk--our-music.html
- [+] http://www.nationalistwomensfront.org//reading-downloads.html
- [+] http://www.nationalistwomensfront.org//gallery.html
- [+] http://www.nationalistwomensfront.org//contact.html
- [+] http://www.nationalistwomensfront.org//kind-kindred.html
- [+] http://www.nationalistwomensfront.org//our-folk--our-music.html
- [+] http://www.nationalistwomensfront.org//home.html
- [+] http://www.nationalistwomensfront.org//about.html
- [+] http://www.nationalistwomensfront.org//our-folk--our-music.html
- [+] http://www.nationalistwomensfront.org//reading-downloads.html
- [+] http://www.nationalistwomensfront.org//gallery.html
- [+] http://www.nationalistwomensfront.org//contact.html
- [+] http://www.nationalistwomensfront.org//kind-kindred.html
- --------------------------------------------------
- [!] 2 External links Discovered
- [#] https://nationalistwomensfront.wordpress.com/
- [#] https://nationalistwomensfront.wordpress.com/
- --------------------------------------------------
- [#] Mapping Subdomain..
- [!] Found 1 Subdomain
- - nationalistwomensfront.org
- --------------------------------------------------
- [!] Done At 2019-10-22 13:33:48.784150
- #######################################################################################################################################
- [i] Scanning Site: http://www.nationalistwomensfront.org
- B A S I C I N F O
- ====================
- [+] Site Title: Home
- [+] IP address: 160.153.136.3
- [+] Web Server: DPS/1.6.13
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /cache/
- Disallow: /_backup/
- Disallow: /_mygallery/
- Disallow: /_temp/
- Disallow: /_tempalbums/
- Disallow: /_tmpfileop/
- Disallow: /dbboon/
- Disallow: /Flash/
- Disallow: /images/
- Disallow: /mobile/
- Disallow: /plugins/
- Disallow: /scripts/
- Disallow: /stats/
- Disallow: /statshistory/
- Disallow: /QSC/
- -----------[end of contents]-------------
- W H O I S L O O K U P
- ========================
- Domain Name: NATIONALISTWOMENSFRONT.ORG
- Registry Domain ID: D402200000000428464-LROR
- Registrar WHOIS Server: whois.godaddy.com
- Registrar URL: http://www.whois.godaddy.com
- Updated Date: 2018-11-02T14:13:16Z
- Creation Date: 2016-10-30T20:59:50Z
- Registry Expiry Date: 2019-10-30T20:59:50Z
- Registrar Registration Expiration Date:
- Registrar: GoDaddy.com, LLC
- Registrar IANA ID: 146
- Registrar Abuse Contact Email: abuse@godaddy.com
- Registrar Abuse Contact Phone: +1.4806242505
- Reseller:
- Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
- Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
- Registrant Organization: Domains By Proxy, LLC
- Registrant State/Province: Arizona
- Registrant Country: US
- Name Server: NS57.DOMAINCONTROL.COM
- Name Server: NS58.DOMAINCONTROL.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
- >>> Last update of WHOIS database: 2019-10-22T17:32:20Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- G E O I P L O O K U P
- =========================
- [i] IP Address: 198.71.232.3
- [i] Country: United States
- [i] State: Arizona
- [i] City: Scottsdale
- [i] Latitude: 33.6013
- [i] Longitude: -111.8867
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.1 200 OK
- [i] Link: <http://www.nationalistwomensfront.org/site.css?v=>; rel=preload; as=style,<https://fonts.googleapis.com>; rel=preconnect; crossorigin,<https://fonts.gstatic.com>; rel=preconnect; crossorigin,<https://img1.wsimg.com>; rel=preconnect; crossorigin,<https://img2.wsimg.com>; rel=preconnect; crossorigin,<https://img4.wsimg.com>; rel=preconnect; crossorigin,<http://img4.wsimg.com>; rel=preconnect; crossorigin,<http://nebula.wsimg.com>; rel=preconnect; crossorigin
- [i] Cache-Control: public, max-age=60, s-maxage=300
- [i] Content-Security-Policy: frame-ancestors 'self'
- [i] Content-Type: text/html; charset=utf-8
- [i] Vary: Accept-Encoding
- [i] Content-Encoding: raw
- [i] Server: DPS/1.6.13
- [i] X-SiteId: 4000
- [i] Set-Cookie: dps_site_id=4000; path=/
- [i] ETag: 2533d89302079c16f08a4ca667c29a4f
- [i] Date: Tue, 22 Oct 2019 17:33:22 GMT
- [i] Connection: close
- D N S L O O K U P
- ===================
- nationalistwomensfront.org. 599 IN A 198.71.232.3
- nationalistwomensfront.org. 3599 IN NS ns57.domaincontrol.com.
- nationalistwomensfront.org. 3599 IN NS ns58.domaincontrol.com.
- nationalistwomensfront.org. 599 IN SOA ns57.domaincontrol.com. dns.jomax.net. 2018051103 28800 7200 604800 600
- nationalistwomensfront.org. 3599 IN MX 10 mailstore1.secureserver.net.
- nationalistwomensfront.org. 3599 IN MX 0 smtp.secureserver.net.
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 198.71.232.3
- Network = 198.71.232.3 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 198.71.232.3 - 198.71.232.3 }
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-10-22 17:33 UTC
- Nmap scan report for nationalistwomensfront.org (198.71.232.3)
- Host is up (0.0067s latency).
- rDNS record for 198.71.232.3: ip-198-71-232-3.ip.secureserver.net
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.41 seconds
- #######################################################################################################################################
- [INFO] ------TARGET info------
- [*] TARGET: http://www.nationalistwomensfront.org/
- [*] TARGET IP: 160.153.136.3
- [INFO] NO load balancer detected for www.nationalistwomensfront.org...
- [*] DNS servers: nationalistwomensfront.org.
- [*] TARGET server: DPS/1.6.13
- [*] CC: NL
- [*] Country: Netherlands
- [*] RegionCode: NH
- [*] RegionName: North Holland
- [*] City: Amsterdam
- [*] ASN: AS26496
- [*] BGP_PREFIX: 160.153.128.0/17
- [*] ISP: AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US
- [INFO] DNS enumeration:
- [*] ftp.nationalistwomensfront.org nationalistwomensfront.org. 160.153.136.3
- [INFO] Possible abuse mails are:
- [*] abuse@nationalistwomensfront.org
- [*] abuse@www.nationalistwomensfront.org
- [*] fbl-spamcop@ext.godaddy.com
- [INFO] NO PAC (Proxy Auto Configuration) file FOUND
- [ALERT] robots.txt file FOUND in http://www.nationalistwomensfront.org/robots.txt
- [INFO] Checking for HTTP status codes recursively from http://www.nationalistwomensfront.org/robots.txt
- [INFO] Status code Folders
- [INFO] Starting FUZZing in http://www.nationalistwomensfront.org/FUzZzZzZzZz...
- [INFO] Status code Folders
- [ALERT] Look in the source code. It may contain passwords
- [INFO] Links found from http://www.nationalistwomensfront.org/ http://160.153.136.3/:
- [*] https://nationalistwomensfront.wordpress.com/
- [*] http://www.nationalistwomensfront.org/
- [*] http://www.nationalistwomensfront.org/about.html
- [*] http://www.nationalistwomensfront.org/contact.html
- [*] http://www.nationalistwomensfront.org/gallery.html
- [*] http://www.nationalistwomensfront.org/home.html
- [*] http://www.nationalistwomensfront.org/kind-kindred.html
- [*] http://www.nationalistwomensfront.org/our-folk--our-music.html
- [*] http://www.nationalistwomensfront.org/reading-downloads.html
- [*] http://www.youtube.com/embed/fuMUDmETSP8?feature=oembed&wmode=opaque&theme=dark&showinfo=1&autoplay=0
- [INFO] GOOGLE has 232 results (0.18 seconds) about http://www.nationalistwomensfront.org/
- [INFO] Shodan detected the following opened ports on 160.153.136.3:
- [*] 443
- [*] 80
- [INFO] ------VirusTotal SECTION------
- [INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
- [INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
- [INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
- [INFO] ------Alexa Rank SECTION------
- [INFO] Percent of Visitors Rank in Country:
- [INFO] Percent of Search Traffic:
- [INFO] Percent of Unique Visits:
- [INFO] Total Sites Linking In:
- [*] Total Sites
- [INFO] Useful links related to www.nationalistwomensfront.org - 160.153.136.3:
- [*] https://www.virustotal.com/pt/ip-address/160.153.136.3/information/
- [*] https://www.hybrid-analysis.com/search?host=160.153.136.3
- [*] https://www.shodan.io/host/160.153.136.3
- [*] https://www.senderbase.org/lookup/?search_string=160.153.136.3
- [*] https://www.alienvault.com/open-threat-exchange/ip/160.153.136.3
- [*] http://pastebin.com/search?q=160.153.136.3
- [*] http://urlquery.net/search.php?q=160.153.136.3
- [*] http://www.alexa.com/siteinfo/www.nationalistwomensfront.org
- [*] http://www.google.com/safebrowsing/diagnostic?site=www.nationalistwomensfront.org
- [*] https://censys.io/ipv4/160.153.136.3
- [*] https://www.abuseipdb.com/check/160.153.136.3
- [*] https://urlscan.io/search/#160.153.136.3
- [*] https://github.com/search?q=160.153.136.3&type=Code
- [INFO] Useful links related to AS26496 - 160.153.128.0/17:
- [*] http://www.google.com/safebrowsing/diagnostic?site=AS:26496
- [*] https://www.senderbase.org/lookup/?search_string=160.153.128.0/17
- [*] http://bgp.he.net/AS26496
- [*] https://stat.ripe.net/AS26496
- [INFO] Date: 22/10/19 | Time: 13:34:52
- [INFO] Total time: 1 minute(s) and 18 second(s)
- #######################################################################################################################################
- Trying "nationalistwomensfront.org"
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48910
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 2, ADDITIONAL: 4
- ;; QUESTION SECTION:
- ;nationalistwomensfront.org. IN ANY
- ;; ANSWER SECTION:
- nationalistwomensfront.org. 3600 IN MX 0 smtp.secureserver.net.
- nationalistwomensfront.org. 3600 IN MX 10 mailstore1.secureserver.net.
- nationalistwomensfront.org. 600 IN SOA ns57.domaincontrol.com. dns.jomax.net. 2018051103 28800 7200 604800 600
- nationalistwomensfront.org. 600 IN A 198.71.232.3
- nationalistwomensfront.org. 3600 IN NS ns57.domaincontrol.com.
- nationalistwomensfront.org. 3600 IN NS ns58.domaincontrol.com.
- ;; AUTHORITY SECTION:
- nationalistwomensfront.org. 3600 IN NS ns57.domaincontrol.com.
- nationalistwomensfront.org. 3600 IN NS ns58.domaincontrol.com.
- ;; ADDITIONAL SECTION:
- ns57.domaincontrol.com. 20187 IN A 97.74.108.29
- ns57.domaincontrol.com. 20187 IN AAAA 2603:5:21c2::1d
- ns58.domaincontrol.com. 34365 IN A 173.201.76.29
- ns58.domaincontrol.com. 34365 IN AAAA 2603:5:22c2::1d
- Received 341 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 91 ms
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace nationalistwomensfront.org
- ;; global options: +cmd
- . 81021 IN NS i.root-servers.net.
- . 81021 IN NS f.root-servers.net.
- . 81021 IN NS a.root-servers.net.
- . 81021 IN NS e.root-servers.net.
- . 81021 IN NS k.root-servers.net.
- . 81021 IN NS b.root-servers.net.
- . 81021 IN NS m.root-servers.net.
- . 81021 IN NS g.root-servers.net.
- . 81021 IN NS j.root-servers.net.
- . 81021 IN NS d.root-servers.net.
- . 81021 IN NS l.root-servers.net.
- . 81021 IN NS c.root-servers.net.
- . 81021 IN NS h.root-servers.net.
- . 81021 IN RRSIG NS 8 0 518400 20191104050000 20191022040000 22545 . V7L2dB4F79xO9lx8hztPB86SYLY35tcInKqSk8aLbD8fvpqah4DWHoDe 2xbqt74EJPvBDnnxjmyB4tREMvAE2pcJYRcXgEXojn3yhrQSsQ3jFs5F PjYgRw0D2xB2yHw8rQ4l16CD7aEVgG+FefFGqt3W+daAM1PO+IYKW0wG ZlUdJNJSe51nOWemZldGoqlKha/wznCidzCCANqSG6ZPNuvTOgIFhRZB drsNOA4MFLWYNYyQpPWFiqtgkB5nZx3ACgXg/VY6Jy/blXbeM75bse+V 1878EtXXH4TdBRmzNhEyyy6uJa9iO9OjpIn2SDrdVRzSlWOKvOH+Pw8i KLe1JA==
- ;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 272 ms
- org. 172800 IN NS a0.org.afilias-nst.info.
- org. 172800 IN NS a2.org.afilias-nst.info.
- org. 172800 IN NS b0.org.afilias-nst.org.
- org. 172800 IN NS b2.org.afilias-nst.org.
- org. 172800 IN NS c0.org.afilias-nst.info.
- org. 172800 IN NS d0.org.afilias-nst.org.
- org. 86400 IN DS 9795 7 1 364DFAB3DAF254CAB477B5675B10766DDAA24982
- org. 86400 IN DS 9795 7 2 3922B31B6F3A4EA92B19EB7B52120F031FD8E05FF0B03BAFCF9F891B FE7FF8E5
- org. 86400 IN RRSIG DS 8 1 86400 20191104050000 20191022040000 22545 . a+NrqecFlVIEJ/klea8l0RJCxgdmQJNSVkEU6dOhHy7rRdbnmIH/WK/X Eca65JCaAWWSvxNhtTB6UDBoLidpi66nFf7xR1ttpJdOT8rq6JFEPN95 AX44pV+0qL6Z4R7vmRWT80GPbejaiPSqyeXp/x7g9CkosRewdOsPj4MB 2XxnfPzNcl9cgJ4iuzNU6HdxNHjqPJ45+0uujeIBB5V8TlhPfpUEnGW1 nZVi+SUWml1cJxQL5tUgXDcX/oybapZLWNqTrcCtZpXt9vxyfobDOuLX 08aePxIMjD1GcEk7M5ioy1+CAqwMBwsxHC6TZssUOu74o6aRKbtI8+PU 7R3ZKg==
- ;; Received 828 bytes from 192.203.230.10#53(e.root-servers.net) in 118 ms
- nationalistwomensfront.org. 86400 IN NS ns58.domaincontrol.com.
- nationalistwomensfront.org. 86400 IN NS ns57.domaincontrol.com.
- h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN NSEC3 1 1 1 D399EAAB H9PAES2EQ3K44BAR1F3TIUO0J45719RJ NS SOA RRSIG DNSKEY NSEC3PARAM
- h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN RRSIG NSEC3 7 2 86400 20191112174347 20191022164347 36752 org. t8BRlsgclKHw3HNElXfpfCDFueCG1nNq56hcBun4snPzsnHEpgBczzu+ AJcKH0RS8sWKs8LeKxmZZ0GmTIvEfYKQ1ECrw9BvGR2GuawYpPtqmgLj yupRyaDO2KX8DznEYd1pGwX5YqYjxlFC0kJKFVQsWiQAOAXeF7wfKRHw zmQ=
- j2r5vpg7rfhpik8jg590pd00bljnunva.org. 86400 IN NSEC3 1 1 1 D399EAAB J2R8VDHQRK678OCSIHCQLIFV4LQV3ERP NS DS RRSIG
- j2r5vpg7rfhpik8jg590pd00bljnunva.org. 86400 IN RRSIG NSEC3 7 2 86400 20191109152857 20191019142857 36752 org. d8Vf8mal8zD8tDYcP48CUTpG40jX/le39A062cOxqOGe9BsY/+TYdIk+ Vzvou1dKNxiyo2NcHcxBdiUD4f0DIAkU0QV07EsiwQXRN71DaESzvDwf IR4XBphMaWkv6pRNAE7mWh0t1TO7lsv+9p5Ei46PQkPbRgedE1hvdiCj Jns=
- ;; Received 603 bytes from 2001:500:b::1#53(c0.org.afilias-nst.info) in 177 ms
- nationalistwomensfront.org. 600 IN A 182.50.132.242
- nationalistwomensfront.org. 3600 IN NS ns57.domaincontrol.com.
- nationalistwomensfront.org. 3600 IN NS ns58.domaincontrol.com.
- ;; Received 126 bytes from 97.74.108.29#53(ns57.domaincontrol.com) in 348 ms
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: nationalistwomensfront.org
- [-] DNSSEC is not configured for nationalistwomensfront.org
- [*] SOA ns57.domaincontrol.com 97.74.108.29
- [*] NS ns58.domaincontrol.com 173.201.76.29
- [*] NS ns58.domaincontrol.com 2603:5:22c2::1d
- [*] NS ns57.domaincontrol.com 97.74.108.29
- [*] NS ns57.domaincontrol.com 2603:5:21c2::1d
- [*] MX smtp.secureserver.net 72.167.238.29
- [*] MX smtp.secureserver.net 68.178.213.37
- [*] MX smtp.secureserver.net 68.178.213.203
- [*] MX mailstore1.secureserver.net 72.167.238.32
- [*] MX mailstore1.secureserver.net 68.178.213.243
- [*] MX mailstore1.secureserver.net 68.178.213.244
- [*] A nationalistwomensfront.org 160.153.136.3
- [*] Enumerating SRV Records
- [-] No SRV Records Found for nationalistwomensfront.org
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain nationalistwomensfront.org
- [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
- [+] Getting nameservers
- 173.201.76.29 - ns58.domaincontrol.com
- 97.74.108.29 - ns57.domaincontrol.com
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 0 smtp.secureserver.net.
- 10 mailstore1.secureserver.net.
- [*] Scanning nationalistwomensfront.org for A records
- 160.153.136.3 - nationalistwomensfront.org
- 68.178.252.20 - email.nationalistwomensfront.org
- 173.201.192.5 - email.nationalistwomensfront.org
- 45.40.130.40 - email.nationalistwomensfront.org
- 173.201.193.5 - email.nationalistwomensfront.org
- 72.167.218.45 - email.nationalistwomensfront.org
- 45.40.140.6 - email.nationalistwomensfront.org
- 97.74.135.45 - email.nationalistwomensfront.org
- 72.167.218.183 - email.nationalistwomensfront.org
- 173.201.193.148 - email.nationalistwomensfront.org
- 173.201.193.20 - email.nationalistwomensfront.org
- 173.201.192.133 - email.nationalistwomensfront.org
- 72.167.218.173 - email.nationalistwomensfront.org
- 97.74.135.55 - email.nationalistwomensfront.org
- 97.74.135.133 - email.nationalistwomensfront.org
- 68.178.252.133 - email.nationalistwomensfront.org
- 68.178.252.148 - email.nationalistwomensfront.org
- 45.40.130.41 - email.nationalistwomensfront.org
- 173.201.193.133 - email.nationalistwomensfront.org
- 173.201.192.148 - email.nationalistwomensfront.org
- 173.201.192.20 - email.nationalistwomensfront.org
- 97.74.135.148 - email.nationalistwomensfront.org
- 68.178.252.5 - email.nationalistwomensfront.org
- 72.167.218.55 - email.nationalistwomensfront.org
- 160.153.136.3 - ftp.nationalistwomensfront.org
- 160.153.136.3 - www.nationalistwomensfront.org
- #######################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- CompressionPlugin
- OpenSslCipherSuitesPlugin
- HeartbleedPlugin
- RobotPlugin
- CertificateInfoPlugin
- FallbackScsvPlugin
- OpenSslCcsInjectionPlugin
- HttpHeadersPlugin
- SessionRenegotiationPlugin
- SessionResumptionPlugin
- EarlyDataPlugin
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- 160.153.136.3:443 => 160.153.136.3
- SCAN RESULTS FOR 160.153.136.3:443 - 160.153.136.3
- --------------------------------------------------
- * Deflate Compression:
- OK - Compression disabled
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * Certificate Information:
- Content
- SHA1 Fingerprint: 11788ec0058ca3d50644a3fed9c4636726d2fc1d
- Common Name: *.godaddysites.com
- Issuer: Go Daddy Secure Certificate Authority - G2
- Serial Number: 16026561006907939041
- Not Before: 2018-08-03 16:00:21
- Not After: 2020-08-03 16:00:21
- Signature Algorithm: sha256
- Public Key Algorithm: RSA
- Key Size: 2048
- Exponent: 65537 (0x10001)
- DNS Subject Alternative Names: ['*.godaddysites.com', 'godaddysites.com']
- Trust
- Hostname Validation: FAILED - Certificate does NOT match 160.153.136.3
- Android CA Store (9.0.0_r9): OK - Certificate is trusted
- Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
- Java CA Store (jdk-12.0.1): OK - Certificate is trusted
- Mozilla CA Store (2019-03-14): OK - Certificate is trusted
- Windows CA Store (2019-05-27): OK - Certificate is trusted
- Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
- Received Chain: *.godaddysites.com --> Go Daddy Secure Certificate Authority - G2
- Verified Chain: *.godaddysites.com --> Go Daddy Secure Certificate Authority - G2 --> Go Daddy Root Certificate Authority - G2
- Received Chain Contains Anchor: OK - Anchor certificate not sent
- Received Chain Order: OK - Order is valid
- Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
- Extensions
- OCSP Must-Staple: NOT SUPPORTED - Extension not found
- Certificate Transparency: OK - 3 SCTs included
- OCSP Stapling
- NOT SUPPORTED - Server did not send back an OCSP response
- * TLSV1_1 Cipher Suites:
- Server rejected all cipher suites.
- * TLSV1 Cipher Suites:
- Server rejected all cipher suites.
- * Downgrade Attacks:
- TLS_FALLBACK_SCSV: OK - Supported
- * OpenSSL CCS Injection:
- OK - Not vulnerable to OpenSSL CCS injection
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- * TLSV1_2 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
- Accepted:
- TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
- TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 404 Not Found
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
- TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
- TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 256 bits HTTP 404 Not Found
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 404 Not Found
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 404 Not Found
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 404 Not Found
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 404 Not Found
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 404 Not Found
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 404 Not Found
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * TLS 1.2 Session Resumption Support:
- With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
- With TLS Tickets: NOT SUPPORTED - TLS ticket assigned but not accepted.
- * TLSV1_3 Cipher Suites:
- Server rejected all cipher suites.
- * Session Renegotiation:
- Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
- Secure Renegotiation: OK - Supported
- * ROBOT Attack:
- OK - Not vulnerable
- SCAN COMPLETED IN 30.02 S
- -------------------------
- #######################################################################################################################################
- Parsero scan report for www.nationalistwomensfront.org
- http://www.nationalistwomensfront.org/_temp/ 404 Not Found
- http://www.nationalistwomensfront.org/_mygallery/ 404 Not Found
- http://www.nationalistwomensfront.org/plugins/ 404 Not Found
- http://www.nationalistwomensfront.org/QSC/ 404 Not Found
- http://www.nationalistwomensfront.org/dbboon/ 404 Not Found
- http://www.nationalistwomensfront.org/stats/ 404 Not Found
- http://www.nationalistwomensfront.org/mobile/ 200 OK
- http://www.nationalistwomensfront.org/images/ 404 Not Found
- http://www.nationalistwomensfront.org/Flash/ 404 Not Found
- http://www.nationalistwomensfront.org/_tmpfileop/ 404 Not Found
- http://www.nationalistwomensfront.org/statshistory/ 404 Not Found
- http://www.nationalistwomensfront.org/_tempalbums/ 404 Not Found
- http://www.nationalistwomensfront.org/scripts/ 404 Not Found
- http://www.nationalistwomensfront.org/cache/ 404 Not Found
- http://www.nationalistwomensfront.org/_backup/ 404 Not Found
- [+] 15 links have been analyzed and 1 of them are available!!!
- #######################################################################################################################################
- Domains still to check: 1
- Checking if the hostname nationalistwomensfront.org. given is in fact a domain...
- Analyzing domain: nationalistwomensfront.org.
- Checking NameServers using system default resolver...
- IP: 173.201.76.29 (United States)
- HostName: ns58.domaincontrol.com Type: NS
- HostName: ns58.domaincontrol.com Type: PTR
- IP: 97.74.108.29 (United States)
- HostName: ns57.domaincontrol.com Type: NS
- HostName: ns57.domaincontrol.com Type: PTR
- Checking MailServers using system default resolver...
- IP: 72.167.238.29 (United States)
- HostName: smtp.secureserver.net Type: MX
- HostName: p3plibsmtp01-v01.prod.phx3.secureserver.net Type: PTR
- IP: 68.178.213.37 (United States)
- HostName: smtp.secureserver.net Type: MX
- HostName: p3plibsmtp02-v01.prod.phx3.secureserver.net Type: PTR
- IP: 68.178.213.203 (United States)
- HostName: smtp.secureserver.net Type: MX
- HostName: p3plibsmtp03-v01.prod.phx3.secureserver.net Type: PTR
- IP: 68.178.213.243 (United States)
- HostName: mailstore1.secureserver.net Type: MX
- HostName: ip-68-178-213-243.ip.secureserver.net Type: PTR
- IP: 68.178.213.244 (United States)
- HostName: mailstore1.secureserver.net Type: MX
- HostName: ip-68-178-213-244.ip.secureserver.net Type: PTR
- IP: 72.167.238.32 (United States)
- HostName: mailstore1.secureserver.net Type: MX
- HostName: p3pismtp01-065.prod.phx3.secureserver.net Type: PTR
- Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
- No zone transfer found on nameserver 173.201.76.29
- No zone transfer found on nameserver 97.74.108.29
- Checking SPF record...
- No SPF record
- Checking 192 most common hostnames using system default resolver...
- IP: 160.153.136.3 (United States)
- HostName: www.nationalistwomensfront.org. Type: A
- IP: 160.153.136.3 (United States)
- HostName: www.nationalistwomensfront.org. Type: A
- HostName: ftp.nationalistwomensfront.org. Type: A
- HostName: ip-160-153-136-3.ip.secureserver.net Type: PTR
- Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
- Checking netblock 68.178.213.0
- Checking netblock 72.167.238.0
- Checking netblock 160.153.136.0
- Checking netblock 173.201.76.0
- Checking netblock 97.74.108.0
- Searching for nationalistwomensfront.org. emails in Google
- Checking 9 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
- Host 68.178.213.244 is up (reset ttl 64)
- Host 68.178.213.243 is up (reset ttl 64)
- Host 72.167.238.29 is up (reset ttl 64)
- Host 68.178.213.203 is up (reset ttl 64)
- Host 160.153.136.3 is up (echo-reply ttl 52)
- Host 173.201.76.29 is up (reset ttl 64)
- Host 72.167.238.32 is up (reset ttl 64)
- Host 97.74.108.29 is up (reset ttl 64)
- Host 68.178.213.37 is up (echo-reply ttl 56)
- Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
- Scanning ip 68.178.213.244 (ip-68-178-213-244.ip.secureserver.net (PTR)):
- Scanning ip 68.178.213.243 (ip-68-178-213-243.ip.secureserver.net (PTR)):
- Scanning ip 72.167.238.29 (p3plibsmtp01-v01.prod.phx3.secureserver.net (PTR)):
- Scanning ip 68.178.213.203 (p3plibsmtp03-v01.prod.phx3.secureserver.net (PTR)):
- Scanning ip 160.153.136.3 (ip-160-153-136-3.ip.secureserver.net (PTR)):
- 80/tcp open http syn-ack ttl 52 Samsung AllShare httpd
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: DPS/1.6.13
- |_http-title: Site doesn't have a title.
- 443/tcp open ssl/http syn-ack ttl 52 Samsung AllShare httpd
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: DPS/1.6.13
- |_http-title: Site doesn't have a title.
- | ssl-cert: Subject: commonName=*.godaddysites.com
- | Subject Alternative Name: DNS:*.godaddysites.com, DNS:godaddysites.com
- | Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-03T16:00:21
- | Not valid after: 2020-08-03T16:00:21
- | MD5: 0cb0 4cf0 32a8 b22b aea7 9873 dae5 5d65
- |_SHA-1: 1178 8ec0 058c a3d5 0644 a3fe d9c4 6367 26d2 fc1d
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- | h2
- |_ http/1.1
- Scanning ip 173.201.76.29 (ns58.domaincontrol.com (PTR)):
- 53/tcp open tcpwrapped syn-ack ttl 55
- Scanning ip 72.167.238.32 (p3pismtp01-065.prod.phx3.secureserver.net (PTR)):
- Scanning ip 97.74.108.29 (ns57.domaincontrol.com (PTR)):
- 53/tcp open tcpwrapped syn-ack ttl 55
- Scanning ip 68.178.213.37 (p3plibsmtp02-v01.prod.phx3.secureserver.net (PTR)):
- WebCrawling domain's web servers... up to 50 max links.
- + URL to crawl: http://www.nationalistwomensfront.org.
- + Date: 2019-10-22
- + Crawling URL: http://www.nationalistwomensfront.org.:
- + Links:
- + Crawling http://www.nationalistwomensfront.org. (404 Not Found)
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: http://ftp.nationalistwomensfront.org.
- + Date: 2019-10-22
- + Crawling URL: http://ftp.nationalistwomensfront.org.:
- + Links:
- + Crawling http://ftp.nationalistwomensfront.org. (404 Not Found)
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://www.nationalistwomensfront.org.
- + Date: 2019-10-22
- + Crawling URL: https://www.nationalistwomensfront.org.:
- + Links:
- + Crawling https://www.nationalistwomensfront.org.
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://ftp.nationalistwomensfront.org.
- + Date: 2019-10-22
- + Crawling URL: https://ftp.nationalistwomensfront.org.:
- + Links:
- + Crawling https://ftp.nationalistwomensfront.org.
- + Searching for directories...
- + Searching open folders...
- --Finished--
- Summary information for domain nationalistwomensfront.org.
- -----------------------------------------
- Domain Ips Information:
- IP: 68.178.213.244
- HostName: mailstore1.secureserver.net Type: MX
- HostName: ip-68-178-213-244.ip.secureserver.net Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- IP: 68.178.213.243
- HostName: mailstore1.secureserver.net Type: MX
- HostName: ip-68-178-213-243.ip.secureserver.net Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- IP: 72.167.238.29
- HostName: smtp.secureserver.net Type: MX
- HostName: p3plibsmtp01-v01.prod.phx3.secureserver.net Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- IP: 68.178.213.203
- HostName: smtp.secureserver.net Type: MX
- HostName: p3plibsmtp03-v01.prod.phx3.secureserver.net Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- IP: 160.153.136.3
- HostName: www.nationalistwomensfront.org. Type: A
- HostName: ftp.nationalistwomensfront.org. Type: A
- HostName: ip-160-153-136-3.ip.secureserver.net Type: PTR
- Country: United States
- Is Active: True (echo-reply ttl 52)
- Port: 80/tcp open http syn-ack ttl 52 Samsung AllShare httpd
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-server-header: DPS/1.6.13
- Script Info: |_http-title: Site doesn't have a title.
- Port: 443/tcp open ssl/http syn-ack ttl 52 Samsung AllShare httpd
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-server-header: DPS/1.6.13
- Script Info: |_http-title: Site doesn't have a title.
- Script Info: | ssl-cert: Subject: commonName=*.godaddysites.com
- Script Info: | Subject Alternative Name: DNS:*.godaddysites.com, DNS:godaddysites.com
- Script Info: | Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2018-08-03T16:00:21
- Script Info: | Not valid after: 2020-08-03T16:00:21
- Script Info: | MD5: 0cb0 4cf0 32a8 b22b aea7 9873 dae5 5d65
- Script Info: |_SHA-1: 1178 8ec0 058c a3d5 0644 a3fe d9c4 6367 26d2 fc1d
- Script Info: |_ssl-date: TLS randomness does not represent time
- Script Info: | tls-alpn:
- Script Info: | h2
- Script Info: |_ http/1.1
- IP: 173.201.76.29
- HostName: ns58.domaincontrol.com Type: NS
- HostName: ns58.domaincontrol.com Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- Port: 53/tcp open tcpwrapped syn-ack ttl 55
- IP: 72.167.238.32
- HostName: mailstore1.secureserver.net Type: MX
- HostName: p3pismtp01-065.prod.phx3.secureserver.net Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- IP: 97.74.108.29
- HostName: ns57.domaincontrol.com Type: NS
- HostName: ns57.domaincontrol.com Type: PTR
- Country: United States
- Is Active: True (reset ttl 64)
- Port: 53/tcp open tcpwrapped syn-ack ttl 55
- IP: 68.178.213.37
- HostName: smtp.secureserver.net Type: MX
- HostName: p3plibsmtp02-v01.prod.phx3.secureserver.net Type: PTR
- Country: United States
- Is Active: True (echo-reply ttl 56)
- #######################################################################################################################################
- dnsenum VERSION:1.2.6
- ----- www.nationalistwomensfront.org -----
- Host's addresses:
- __________________
- nationalistwomensfront.org. 598 IN A 160.153.136.3
- Name Servers:
- ______________
- ns58.domaincontrol.com. 85554 IN A 173.201.76.29
- ns57.domaincontrol.com. 85554 IN A 97.74.108.29
- Mail (MX) Servers:
- ___________________
- mailstore1.secureserver.net. 60 IN A 72.167.238.32
- mailstore1.secureserver.net. 60 IN A 68.178.213.243
- mailstore1.secureserver.net. 60 IN A 68.178.213.244
- smtp.secureserver.net. 60 IN A 68.178.213.203
- smtp.secureserver.net. 60 IN A 68.178.213.37
- smtp.secureserver.net. 60 IN A 72.167.238.29
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for www.nationalistwomensfront.org on ns58.domaincontrol.com ...
- Trying Zone Transfer for www.nationalistwomensfront.org on ns57.domaincontrol.com ...
- Brute forcing with /usr/share/dnsenum/dns.txt:
- _______________________________________________
- www.nationalistwomensfront.org class C netranges:
- __________________________________________________
- Performing reverse lookup on 0 ip addresses:
- _____________________________________________
- 0 results out of 0 IP addresses.
- www.nationalistwomensfront.org ip blocks:
- __________________________________________
- done.
- #######################################################################################################################################
- [*] Processing domain www.nationalistwomensfront.org
- [*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
- [+] Getting nameservers
- 173.201.76.29 - ns58.domaincontrol.com
- 97.74.108.29 - ns57.domaincontrol.com
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 10 mailstore1.secureserver.net.
- 0 smtp.secureserver.net.
- [*] Scanning www.nationalistwomensfront.org for A records
- 160.153.136.3 - www.nationalistwomensfront.org
- #######################################################################################################################################
- Privileges have been dropped to "nobody:nogroup" for security reasons.
- Processed queries: 0
- Received packets: 0
- Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
- Current incoming rate: 0 pps, average: 0 pps
- Current success rate: 0 pps, average: 0 pps
- Finished total: 0, success: 0 (0.00%)
- Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
- Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 0 ( 0.00%) | 0 ( 0.00%)
- NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
- SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
- REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 2100
- Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
- Current incoming rate: 2098 pps, average: 2098 pps
- Current success rate: 1330 pps, average: 1330 pps
- Finished total: 1331, success: 1331 (100.00%)
- Mismatched domains: 253 (12.14%), IDs: 0 (0.00%)
- Failures: 0: 27.65%, 1: 88.66%, 2: 24.42%, 3: 3.08%, 4: 0.38%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 121 ( 9.09%) | 139 ( 6.67%)
- NXDOMAIN: | 1162 ( 87.30%) | 1325 ( 63.58%)
- SERVFAIL: | 48 ( 3.61%) | 58 ( 2.78%)
- REFUSED: | 0 ( 0.00%) | 561 ( 26.92%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 2824
- Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
- Current incoming rate: 722 pps, average: 1410 pps
- Current success rate: 472 pps, average: 900 pps
- Finished total: 1804, success: 1804 (100.00%)
- Mismatched domains: 353 (12.59%), IDs: 0 (0.00%)
- Failures: 0: 20.40%, 1: 45.12%, 2: 22.01%, 3: 11.70%, 4: 5.04%, 5: 1.88%, 6: 0.17%, 7: 0.06%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 154 ( 8.54%) | 174 ( 6.21%)
- NXDOMAIN: | 1590 ( 88.14%) | 1836 ( 65.50%)
- SERVFAIL: | 60 ( 3.33%) | 72 ( 2.57%)
- REFUSED: | 0 ( 0.00%) | 720 ( 25.69%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 2982
- Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
- Current incoming rate: 157 pps, average: 992 pps
- Current success rate: 92 pps, average: 631 pps
- Finished total: 1897, success: 1897 (100.00%)
- Mismatched domains: 387 (13.07%), IDs: 0 (0.00%)
- Failures: 0: 19.40%, 1: 42.91%, 2: 20.93%, 3: 8.86%, 4: 4.43%, 5: 2.64%, 6: 1.27%, 7: 0.63%, 8: 0.05%, 9: 0.05%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 158 ( 8.33%) | 179 ( 6.05%)
- NXDOMAIN: | 1678 ( 88.46%) | 1954 ( 66.01%)
- SERVFAIL: | 61 ( 3.22%) | 74 ( 2.50%)
- REFUSED: | 0 ( 0.00%) | 752 ( 25.41%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3017
- Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
- Current incoming rate: 34 pps, average: 752 pps
- Current success rate: 15 pps, average: 477 pps
- Finished total: 1913, success: 1913 (100.00%)
- Mismatched domains: 398 (13.29%), IDs: 0 (0.00%)
- Failures: 0: 19.24%, 1: 42.55%, 2: 20.75%, 3: 8.78%, 4: 4.39%, 5: 2.40%, 6: 0.99%, 7: 0.58%, 8: 0.16%, 9: 0.42%, 10: 0.05%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.31%) | 180 ( 6.01%)
- NXDOMAIN: | 1693 ( 88.50%) | 1978 ( 66.04%)
- SERVFAIL: | 61 ( 3.19%) | 74 ( 2.47%)
- REFUSED: | 0 ( 0.00%) | 762 ( 25.44%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3028
- Progress: 100.00% (00 h 00 min 05 sec / 00 h 00 min 05 sec)
- Current incoming rate: 10 pps, average: 604 pps
- Current success rate: 1 pps, average: 382 pps
- Finished total: 1915, success: 1915 (100.00%)
- Mismatched domains: 406 (13.51%), IDs: 0 (0.00%)
- Failures: 0: 19.22%, 1: 42.51%, 2: 20.73%, 3: 8.77%, 4: 4.39%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.31%, 10: 0.10%, 11: 0.16%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.30%) | 180 ( 5.99%)
- NXDOMAIN: | 1695 ( 88.51%) | 1987 ( 66.10%)
- SERVFAIL: | 61 ( 3.19%) | 74 ( 2.46%)
- REFUSED: | 0 ( 0.00%) | 764 ( 25.42%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3038
- Progress: 100.00% (00 h 00 min 06 sec / 00 h 00 min 06 sec)
- Current incoming rate: 9 pps, average: 505 pps
- Current success rate: 1 pps, average: 318 pps
- Finished total: 1917, success: 1917 (100.00%)
- Mismatched domains: 414 (13.73%), IDs: 0 (0.00%)
- Failures: 0: 19.20%, 1: 42.46%, 2: 20.71%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.16%, 12: 0.00%, 13: 0.05%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 180 ( 5.97%)
- NXDOMAIN: | 1696 ( 88.47%) | 1994 ( 66.11%)
- SERVFAIL: | 62 ( 3.23%) | 76 ( 2.52%)
- REFUSED: | 0 ( 0.00%) | 765 ( 25.36%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3055
- Progress: 100.00% (00 h 00 min 07 sec / 00 h 00 min 07 sec)
- Current incoming rate: 16 pps, average: 435 pps
- Current success rate: 0 pps, average: 273 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 430 (14.18%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.05%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.97%)
- NXDOMAIN: | 1697 ( 88.48%) | 2002 ( 66.01%)
- SERVFAIL: | 62 ( 3.23%) | 83 ( 2.74%)
- REFUSED: | 0 ( 0.00%) | 766 ( 25.26%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3056
- Progress: 100.00% (00 h 00 min 08 sec / 00 h 00 min 08 sec)
- Current incoming rate: 0 pps, average: 381 pps
- Current success rate: 0 pps, average: 239 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 431 (14.21%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.05%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.97%)
- NXDOMAIN: | 1697 ( 88.48%) | 2002 ( 65.99%)
- SERVFAIL: | 62 ( 3.23%) | 83 ( 2.74%)
- REFUSED: | 0 ( 0.00%) | 767 ( 25.28%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3065
- Progress: 100.00% (00 h 00 min 09 sec / 00 h 00 min 09 sec)
- Current incoming rate: 8 pps, average: 339 pps
- Current success rate: 0 pps, average: 212 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 440 (14.46%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.95%)
- NXDOMAIN: | 1697 ( 88.48%) | 2009 ( 66.02%)
- SERVFAIL: | 62 ( 3.23%) | 83 ( 2.73%)
- REFUSED: | 0 ( 0.00%) | 769 ( 25.27%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3067
- Progress: 100.00% (00 h 00 min 10 sec / 00 h 00 min 10 sec)
- Current incoming rate: 1 pps, average: 306 pps
- Current success rate: 0 pps, average: 191 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 442 (14.52%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.05%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.94%)
- NXDOMAIN: | 1697 ( 88.48%) | 2009 ( 65.98%)
- SERVFAIL: | 62 ( 3.23%) | 84 ( 2.76%)
- REFUSED: | 0 ( 0.00%) | 770 ( 25.29%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3071
- Progress: 100.00% (00 h 00 min 11 sec / 00 h 00 min 11 sec)
- Current incoming rate: 3 pps, average: 278 pps
- Current success rate: 0 pps, average: 174 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 446 (14.63%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.05%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.94%)
- NXDOMAIN: | 1697 ( 88.48%) | 2009 ( 65.89%)
- SERVFAIL: | 62 ( 3.23%) | 86 ( 2.82%)
- REFUSED: | 0 ( 0.00%) | 772 ( 25.32%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3073
- Progress: 100.00% (00 h 00 min 12 sec / 00 h 00 min 12 sec)
- Current incoming rate: 1 pps, average: 255 pps
- Current success rate: 0 pps, average: 159 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 448 (14.68%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.05%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.93%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.88%)
- SERVFAIL: | 62 ( 3.23%) | 86 ( 2.82%)
- REFUSED: | 0 ( 0.00%) | 773 ( 25.34%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3074
- Progress: 100.00% (00 h 00 min 13 sec / 00 h 00 min 13 sec)
- Current incoming rate: 0 pps, average: 236 pps
- Current success rate: 0 pps, average: 147 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 449 (14.71%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.05%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.93%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.86%)
- SERVFAIL: | 62 ( 3.23%) | 86 ( 2.82%)
- REFUSED: | 0 ( 0.00%) | 774 ( 25.36%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3076
- Progress: 100.00% (00 h 00 min 14 sec / 00 h 00 min 14 sec)
- Current incoming rate: 1 pps, average: 219 pps
- Current success rate: 0 pps, average: 136 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 451 (14.77%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.05%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.93%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.82%)
- SERVFAIL: | 62 ( 3.23%) | 86 ( 2.82%)
- REFUSED: | 0 ( 0.00%) | 776 ( 25.41%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3076
- Progress: 100.00% (00 h 00 min 15 sec / 00 h 00 min 15 sec)
- Current incoming rate: 0 pps, average: 204 pps
- Current success rate: 0 pps, average: 127 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 451 (14.77%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.05%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.93%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.82%)
- SERVFAIL: | 62 ( 3.23%) | 86 ( 2.82%)
- REFUSED: | 0 ( 0.00%) | 776 ( 25.41%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3078
- Progress: 100.00% (00 h 00 min 16 sec / 00 h 00 min 16 sec)
- Current incoming rate: 1 pps, average: 192 pps
- Current success rate: 0 pps, average: 119 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 453 (14.82%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.05%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.92%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.77%)
- SERVFAIL: | 62 ( 3.23%) | 86 ( 2.81%)
- REFUSED: | 0 ( 0.00%) | 777 ( 25.43%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3079
- Progress: 100.00% (00 h 00 min 17 sec / 00 h 00 min 17 sec)
- Current incoming rate: 0 pps, average: 180 pps
- Current success rate: 0 pps, average: 112 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 454 (14.85%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.05%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.92%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.75%)
- SERVFAIL: | 62 ( 3.23%) | 86 ( 2.81%)
- REFUSED: | 0 ( 0.00%) | 778 ( 25.45%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3081
- Progress: 100.00% (00 h 00 min 18 sec / 00 h 00 min 18 sec)
- Current incoming rate: 1 pps, average: 170 pps
- Current success rate: 0 pps, average: 106 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 456 (14.91%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.05%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.92%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.71%)
- SERVFAIL: | 62 ( 3.23%) | 87 ( 2.84%)
- REFUSED: | 0 ( 0.00%) | 779 ( 25.47%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3083
- Progress: 100.00% (00 h 00 min 19 sec / 00 h 00 min 19 sec)
- Current incoming rate: 1 pps, average: 161 pps
- Current success rate: 0 pps, average: 100 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 458 (14.96%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.05%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.91%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.66%)
- SERVFAIL: | 62 ( 3.23%) | 87 ( 2.84%)
- REFUSED: | 0 ( 0.00%) | 781 ( 25.51%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3083
- Progress: 100.00% (00 h 00 min 20 sec / 00 h 00 min 20 sec)
- Current incoming rate: 0 pps, average: 153 pps
- Current success rate: 0 pps, average: 95 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 458 (14.96%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.05%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.91%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.66%)
- SERVFAIL: | 62 ( 3.23%) | 87 ( 2.84%)
- REFUSED: | 0 ( 0.00%) | 781 ( 25.51%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3084
- Progress: 100.00% (00 h 00 min 21 sec / 00 h 00 min 21 sec)
- Current incoming rate: 0 pps, average: 146 pps
- Current success rate: 0 pps, average: 91 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 459 (14.99%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.05%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.91%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.64%)
- SERVFAIL: | 62 ( 3.23%) | 88 ( 2.87%)
- REFUSED: | 0 ( 0.00%) | 781 ( 25.51%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3085
- Progress: 100.00% (00 h 00 min 22 sec / 00 h 00 min 22 sec)
- Current incoming rate: 0 pps, average: 139 pps
- Current success rate: 0 pps, average: 87 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 460 (15.02%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.05%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.91%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.62%)
- SERVFAIL: | 62 ( 3.23%) | 88 ( 2.87%)
- REFUSED: | 0 ( 0.00%) | 782 ( 25.53%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3086
- Progress: 100.00% (00 h 00 min 23 sec / 00 h 00 min 23 sec)
- Current incoming rate: 0 pps, average: 133 pps
- Current success rate: 0 pps, average: 83 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 461 (15.05%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.05%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.91%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.60%)
- SERVFAIL: | 62 ( 3.23%) | 88 ( 2.87%)
- REFUSED: | 0 ( 0.00%) | 783 ( 25.55%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3087
- Progress: 100.00% (00 h 00 min 24 sec / 00 h 00 min 24 sec)
- Current incoming rate: 0 pps, average: 128 pps
- Current success rate: 0 pps, average: 79 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 462 (15.07%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.05%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 181 ( 5.91%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.58%)
- SERVFAIL: | 62 ( 3.23%) | 88 ( 2.87%)
- REFUSED: | 0 ( 0.00%) | 784 ( 25.58%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3089
- Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
- Current incoming rate: 1 pps, average: 123 pps
- Current success rate: 0 pps, average: 76 pps
- Finished total: 1918, success: 1918 (100.00%)
- Mismatched domains: 464 (15.13%), IDs: 0 (0.00%)
- Failures: 0: 19.19%, 1: 42.44%, 2: 20.70%, 3: 8.76%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.05%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 182 ( 5.93%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.54%)
- SERVFAIL: | 62 ( 3.23%) | 88 ( 2.87%)
- REFUSED: | 0 ( 0.00%) | 785 ( 25.60%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 1919
- Received packets: 3089
- Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
- Current incoming rate: 0 pps, average: 123 pps
- Current success rate: 0 pps, average: 76 pps
- Finished total: 1919, success: 1918 (99.95%)
- Mismatched domains: 464 (15.13%), IDs: 0 (0.00%)
- Failures: 0: 19.18%, 1: 42.42%, 2: 20.69%, 3: 8.75%, 4: 4.38%, 5: 2.40%, 6: 0.99%, 7: 0.52%, 8: 0.10%, 9: 0.26%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.05%,
- Response: | Success: | Total:
- OK: | 159 ( 8.29%) | 182 ( 5.93%)
- NXDOMAIN: | 1697 ( 88.48%) | 2010 ( 65.54%)
- SERVFAIL: | 62 ( 3.23%) | 88 ( 2.87%)
- REFUSED: | 0 ( 0.00%) | 785 ( 25.60%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- www.nationalistwomensfront.org
- nationalistwomensfront.org.
- #######################################################################################################################################
- [+] www.nationalistwomensfront.org has no SPF record!
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for www.nationalistwomensfront.org!
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 14:14 EDT
- Nmap scan report for www.nationalistwomensfront.org (160.153.136.3)
- Host is up (0.16s latency).
- rDNS record for 160.153.136.3: ip-160-153-136-3.ip.secureserver.net
- Not shown: 995 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 17.13 seconds
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 14:14 EDT
- Nmap scan report for www.nationalistwomensfront.org (160.153.136.3)
- Host is up (0.20s latency).
- rDNS record for 160.153.136.3: ip-160-153-136-3.ip.secureserver.net
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 500/udp open|filtered isakmp
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 4.90 seconds
- #######################################################################################################################################
- HTTP/1.1 404 Not Found
- Content-Type: text/html;charset=utf-8
- Content-Length: 964
- Vary: Accept-Encoding
- Server: DPS/1.6.13
- X-SiteId: 4000
- Set-Cookie: dps_site_id=4000; path=/
- Date: Tue, 22 Oct 2019 18:14:27 GMT
- Connection: keep-alive
- #######################################################################################################################################
- http://www.nationalistwomensfront.org [200 OK] AddThis, Cookies[dps_site_id], Country[UNITED STATES][US], Frame, HTML5, HTTPServer[DPS/1.6.13], IP[160.153.136.3], MetaGenerator[Starfield Technologies; Go Daddy Website Builder 7.0.5350], Open-Graph-Protocol[website], Script[text/javascript], Title[Home], UncommonHeaders[link,content-security-policy,x-siteid], WebsiteTonight, X-UA-Compatible[IE=edge]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://www.nationalistwomensfront.org...
- _________________ SITE INFO __________________
- IP Title
- 160.153.136.3 Home
- __________________ VERSION ___________________
- Name Versions Type
- dps 1.6.13 Platform
- ______________________________________________
- Time: 51.2 sec Urls: 600 Fingerprints: 40401
- #######################################################################################################################################
- ------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [22-10-2019 14:16:23]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.nationalistwomensfront.org/output/inurlbr-www.nationalistwomensfront.org ]
- [ INFO ][ DORK ]::[ site:www.nationalistwomensfront.org ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.cm ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.ca ID: 002901626849897788481:cpnctza84gq ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 7 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 7 ]-[14:16:44] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 7 ]-[14:16:46] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/about.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 7 ]-[14:16:48] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/contact.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 7 ]-[14:16:50] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/gallery.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 7 ]-[14:16:52] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/kind-kindred.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 7 ]-[14:16:54] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/reading-downloads.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 7 ]-[14:16:56] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/our-folk--our-music.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [22-10-2019 14:16:56]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.nationalistwomensfront.org/output/inurlbr-www.nationalistwomensfront.org ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- #######################################################################################################################################
- https://www.nationalistwomensfront.org [200 OK] AddThis, Cookies[dps_site_id], Country[UNITED STATES][US], Frame, HTML5, HTTPServer[DPS/1.6.13], IP[160.153.136.3], MetaGenerator[Starfield Technologies; Go Daddy Website Builder 7.0.5350], Open-Graph-Protocol[website], Script[text/javascript], Title[Home], UncommonHeaders[link,content-security-policy,x-siteid], WebsiteTonight, X-UA-Compatible[IE=edge]
- #######################################################################################################################################
- Version: 1.11.13-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 160.153.136.3
- Testing SSL server www.nationalistwomensfront.org on port 443 using SNI name www.nationalistwomensfront.org
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits AES256-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: *.godaddysites.com
- Altnames: DNS:*.godaddysites.com, DNS:godaddysites.com
- Issuer: Go Daddy Secure Certificate Authority - G2
- Not valid before: Aug 3 16:00:21 2018 GMT
- Not valid after: Aug 3 16:00:21 2020 GMT
- #######################################################################################################################################
- ------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [22-10-2019 14:18:40]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.nationalistwomensfront.org/output/inurlbr-www.nationalistwomensfront.org ]
- [ INFO ][ DORK ]::[ site:www.nationalistwomensfront.org ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.fi ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.io ID: 012984904789461885316:oy3-mu17hxk ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 7 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 7 ]-[14:19:01] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 7 ]-[14:19:03] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/about.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 7 ]-[14:19:05] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/contact.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 7 ]-[14:19:07] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/gallery.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 7 ]-[14:19:09] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/kind-kindred.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 7 ]-[14:19:11] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/reading-downloads.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 7 ]-[14:19:13] [ - ]
- |_[ + ] Target:: [ http://www.nationalistwomensfront.org/our-folk--our-music.html ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: DPS/1.6.13 , IP:160.153.136.3:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [22-10-2019 14:19:13]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.nationalistwomensfront.org/output/inurlbr-www.nationalistwomensfront.org ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 13:43 EDT
- Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Host is up (0.18s latency).
- Not shown: 995 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 17.45 seconds
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 13:43 EDT
- Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Host is up (0.18s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 500/udp open|filtered isakmp
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 4.56 seconds
- #######################################################################################################################################
- HTTP/1.1 404 Not Found
- Content-Length: 3
- Vary: Accept-Encoding
- Server: DPS/1.6.13
- X-SiteId: 4000
- Set-Cookie: dps_site_id=4000; path=/
- Date: Tue, 22 Oct 2019 17:43:29 GMT
- Connection: keep-alive
- #######################################################################################################################################
- http://160.153.136.3 [404 Not Found] Cookies[dps_site_id], Country[UNITED STATES][US], HTTPServer[DPS/1.6.13], IP[160.153.136.3], UncommonHeaders[x-siteid], WebsiteTonight
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://160.153.136.3...
- _________________ SITE INFO __________________
- IP Title
- 160.153.136.3
- __________________ VERSION ___________________
- Name Versions Type
- dps 1.6.13 Platform
- ______________________________________________
- Time: 36.9 sec Urls: 599 Fingerprints: 40401
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 13:44 EDT
- NSE: Loaded 163 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 13:44
- Completed NSE at 13:44, 0.00s elapsed
- Initiating NSE at 13:44
- Completed NSE at 13:44, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 13:44
- Completed Parallel DNS resolution of 1 host. at 13:44, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:44
- Scanning ip-160-153-136-3.ip.secureserver.net (160.153.136.3) [1 port]
- Discovered open port 80/tcp on 160.153.136.3
- Completed SYN Stealth Scan at 13:44, 0.13s elapsed (1 total ports)
- Initiating Service scan at 13:44
- Scanning 1 service on ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Completed Service scan at 13:44, 6.33s elapsed (1 service on 1 host)
- Initiating OS detection (try #1) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Retrying OS detection (try #2) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Initiating Traceroute at 13:44
- Completed Traceroute at 13:44, 3.29s elapsed
- Initiating Parallel DNS resolution of 10 hosts. at 13:44
- Completed Parallel DNS resolution of 10 hosts. at 13:44, 0.42s elapsed
- NSE: Script scanning 160.153.136.3.
- Initiating NSE at 13:44
- Completed NSE at 13:45, 53.63s elapsed
- Initiating NSE at 13:45
- Completed NSE at 13:45, 1.14s elapsed
- Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Host is up (0.14s latency).
- PORT STATE SERVICE VERSION
- 80/tcp open http Samsung AllShare httpd
- | http-brute:
- |_ Path "/" does not require authentication
- |_http-chrono: Request times for /; avg: 744.28ms; min: 598.26ms; max: 851.89ms
- |_http-csrf: Couldn't find any CSRF vulnerabilities.
- |_http-date: Tue, 22 Oct 2019 17:44:37 GMT; -1s from local time.
- |_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
- |_http-dombased-xss: Couldn't find any DOM based XSS.
- |_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
- | http-errors:
- | Spidering limited to: maxpagecount=40; withinhost=ip-160-153-136-3.ip.secureserver.net
- | Found the following error pages:
- |
- | Error Code: 404
- |_ http://ip-160-153-136-3.ip.secureserver.net:80/
- |_http-feed: Couldn't find any feeds.
- |_http-fetch: Please enter the complete path of the directory to save data in.
- | http-headers:
- | Content-Length: 3
- | Vary: Accept-Encoding
- | Server: DPS/1.6.13
- | X-SiteId: 4000
- | Set-Cookie: dps_site_id=4000; path=/
- | Date: Tue, 22 Oct 2019 17:44:46 GMT
- | Connection: close
- |
- |_ (Request type: GET)
- |_http-jsonp-detection: Couldn't find any JSONP endpoints.
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-mobileversion-checker: No mobile version detected.
- |_http-security-headers:
- |_http-server-header: DPS/1.6.13
- | http-sitemap-generator:
- | Directory structure:
- | Longest directory structure:
- | Depth: 0
- | Dir: /
- | Total files found (by extension):
- |_
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- |_http-title: Site doesn't have a title.
- | http-vhosts:
- |_127 names had status 404
- |_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
- |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
- |_http-xssed: No previously reported XSS vuln.
- | vulscan: VulDB - https://vuldb.com:
- | [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
- | [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
- | [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
- | [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
- | [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
- | [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
- | [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
- | [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
- | [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
- | [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
- | [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
- | [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
- | [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
- | [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
- | [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
- | [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
- | [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
- | [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
- | [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
- | [124425] Samsung Members Intent privilege escalation
- | [124418] Samsung Internet Browser Object privilege escalation
- | [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
- | [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
- | [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
- | [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
- | [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
- | [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
- | [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
- | [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
- | [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
- | [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
- | [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
- | [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
- | [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
- | [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
- | [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
- | [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
- | [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
- | [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
- | [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
- | [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
- | [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
- | [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
- | [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
- | [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
- | [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
- | [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
- | [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
- | [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
- | [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
- | [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
- | [115288] Samsung Mobile Device N(7.x) APK privilege escalation
- | [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
- | [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
- | [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
- | [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
- | [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
- | [112195] Samsung Gear Bluetooth weak authentication
- | [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
- | [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
- | [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
- | [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
- | [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
- | [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
- | [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
- | [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
- | [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
- | [102728] Samsung Magician 5.0 TLS Certificate weak encryption
- | [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
- | [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
- | [99817] Samsung Galaxy S6 SecEmailSync sql injection
- | [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
- | [98938] Samsung Account up to 1.6/2.1 weak encryption
- | [98937] Samsung GALAXY Apps weak encryption
- | [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
- | [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
- | [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
- | [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
- | [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
- | [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
- | [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
- | [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
- | [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
- | [94604] Samsung DVR Web Viewer Cookie weak encryption
- | [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
- | [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
- | [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
- | [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
- | [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
- | [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
- | [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
- | [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
- | [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
- | [80263] Samsung SRN-1670D Web Viewer File information disclosure
- | [79057] Samsung Galaxy S6 JPEG Image memory corruption
- | [79056] Samsung Galaxy S6 GIF Image Crash denial of service
- | [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
- | [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
- | [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
- | [76316] Samsung SBeam 15000 NFC Connection information disclosure
- | [76087] Samsung Galaxy S5 createFromParcel memory corruption
- | [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
- | [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
- | [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
- | [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
- | [74213] Samsung Samsung Security Manager up to 1.29 denial of service
- | [73144] Samsung SmartViewer ActiveX Control memory corruption
- | [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
- | [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
- | [68531] Samsung Mobile Devices Remote Control Feature denial of service
- | [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
- | [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
- | [12842] Samsung TV D7000 SSID Authentication weak authentication
- | [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
- | [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
- | [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
- | [64793] Samsung Smart Viewer unknown vulnerability
- | [64792] Samsung Smart Viewer Web View Cleartext information disclosure
- | [9717] Samsung PS50C7700 HTTP Request denial of service
- | [9148] Samsung IP Camera URL Validator cross site scripting
- | [7892] Samsung UE55ES6800 SOAPACTION denial of service
- | [63280] Samsung SamsungDive Subsystem unknown vulnerability
- | [63277] Samsung SamsungDive Subsystem spoofing
- | [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
- | [7168] Samsung LED 3D Smart TV memory corruption
- | [63139] Samsung Kies Air 2.1.210161 Crash denial of service
- | [63138] Samsung Kies Air 2.1.210161 spoofing
- | [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
- | [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
- | [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
- | [61634] Samsung NET-i viewer 1.37.120316 denial of service
- | [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
- | [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
- | [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
- | [60919] Samsung Chromebox 3 unknown vulnerability
- | [5259] Samsung TV MAC Address memory corruption
- | [5258] Samsung TV Controller Packet denial of service
- | [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
- | [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
- |
- | MITRE CVE - https://cve.mitre.org:
- | [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
- | [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
- | [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
- | [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
- | [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
- | [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
- | [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
- | [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
- | [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
- | [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
- | [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
- | [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
- | [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
- | [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
- | [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
- | [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
- | [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
- | [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
- | [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
- | [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
- | [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
- | [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
- | [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
- | [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
- |
- | SecurityFocus - https://www.securityfocus.com/bid/:
- | [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
- | [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
- | [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
- | [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
- | [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
- | [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
- | [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
- | [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
- | [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
- | [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
- | [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
- | [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
- | [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
- | [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
- | [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
- | [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
- | [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
- | [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
- | [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
- | [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
- | [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
- | [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
- | [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
- | [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
- | [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
- | [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
- | [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
- | [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
- | [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
- | [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
- | [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
- | [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
- | [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
- | [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
- | [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
- | [84287] Samsung SW Update Tool Security Bypass Vulnerability
- | [84284] Samsung SW Update Tool Information Disclosure Vulnerability
- | [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
- | [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
- | [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
- | [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
- | [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
- | [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
- | [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
- | [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
- | [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
- | [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
- | [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
- | [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
- | [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
- | [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
- | [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
- | [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
- | [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
- | [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
- | [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
- | [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
- | [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
- | [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
- | [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
- | [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
- | [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
- | [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
- | [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
- | [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
- | [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
- | [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
- | [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
- | [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
- | [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
- | [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
- | [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
- | [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
- | [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
- | [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
- | [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
- | [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
- | [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
- | [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
- | [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
- | [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
- | [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
- | [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
- | [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
- | [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
- | [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
- | [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
- | [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
- | [55936] Samsung Kies Multiple Security Vulnerabilities
- | [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
- | [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
- | [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
- | [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
- | [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
- | [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
- | [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
- | [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
- | [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
- | [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
- | [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
- | [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
- | [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
- | [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
- |
- | IBM X-Force - https://exchange.xforce.ibmcloud.com:
- | [85904] Samsung PS50C7700 TV denial of service
- | [85190] Samsung Galaxy S4 spoofing
- | [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
- | [82662] Samsung TV SOAPACTION denial of service
- | [82602] Samsung Galaxy S III Lock Screen security bypass
- | [82352] Samsung Galaxy S III Passcode Lock security bypass
- | [80926] Samsung Galaxy security bypass
- | [80923] Samsung Galaxy SamsungDive information disclosure
- | [80886] Samsung SmartPhones privilege escalation
- | [80709] Samsung Galaxy S2 kernel privilege escalation
- | [80336] Samsung printers backdoor
- | [80092] Samsung Kies Air security bypass
- | [80091] Samsung Kies Air GET denial of service
- | [79445] Samsung Kies ActiveX Control registry key security bypass
- | [79443] Samsung Kies ActiveX Control security bypass
- | [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
- | [79283] Samsung Kies ActiveX CmdAgent.dll code execution
- | [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
- | [79193] Samsung Galaxy S III sandbox privilege escalation
- | [79192] Samsung Galaxy S III document viewer code execution
- | [78904] Samsung Galaxy S III USSD denial of service
- | [77811] Samsung Galaxy S2 Epic 4G Touch symlink
- | [76396] AllShare libpin3_dll.dll denial of service
- | [75310] Samsung NET-i viewer ActiveX control buffer overflow
- | [75070] Samsung NET-i ware ActiveX control buffer overflow
- | [75069] Samsung NET-i ware ActiveX control code execution
- | [75066] Samsung NET-i ware Master and Storage denial of service
- | [74928] Multiple Samsung TV and BD products string denial of service
- | [74927] Multiple Samsung TV and BD products controller packet denial of service
- | [71316] Samsung Omnia 7 RapiConfig.exe code execution
- | [67315] Samsung Integrated Management System DMS authentication form SQL Injection
- | [50110] Samsung SMS messages authentication bypass
- | [44995] Samsung DVR SHR2040 Web interface denial of service
- | [35502] Samsung SCX-4200 driver installation script privilege escalation
- | [19927] Samsung default accounts and passwords allow unauthorized access
- | [19925] Samsung ADSL Router information disclosure
- | [15973] Samsung SmartEther allows administrative access
- | [6845] Samsung ML-85G printer driver /tmp symlink
- |
- | Exploit-DB - https://www.exploit-db.com:
- | [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
- | [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
- | [27043] Samsung PS50C7700 TV - Denial of Service
- | [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
- | [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
- | [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
- | [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
- | [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
- | [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
- | [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
- | [18751] Samsung D6000 TV Multiple Vulnerabilities
- | [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
- |
- | OpenVAS (Nessus) - http://www.openvas.org:
- | [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
- |
- | SecurityTracker - https://www.securitytracker.com:
- | [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
- | [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
- | [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
- | [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
- | [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
- | [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
- | [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
- | [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
- | [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
- |
- | OSVDB - http://www.osvdb.org:
- | [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
- | [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
- | [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
- | [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
- | [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
- | [94223] Samsung Multiple IP Camera URI XSS
- | [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
- | [91498] Google Android on Samsung Multiple Unspecified DoS
- | [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
- | [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
- | [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
- | [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
- | [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
- | [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
- | [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
- | [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
- | [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
- | [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
- | [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
- | [88379] Samsung LED 3D TV Unspecified Remote Command Execution
- | [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
- | [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
- | [87872] Samsung Multiple Printers Hardcoded Admin Credentials
- | [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
- | [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
- | [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
- | [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
- | [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
- | [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
- | [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
- | [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
- | [79398] Samsung DWCD Web Interface Default Password (Femtocell)
- | [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
- | [72255] Samsung Data Management Server Default Hardcoded root Password
- | [72227] Samsung Data Management Server Unspecified SQL Injection
- | [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
- | [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
- | [54690] Samsung G3210 Web Interface Default Password
- | [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
- | [54688] Samsung G3210 FTP-Server Default Credentials
- | [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
- | [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
- | [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
- | [16684] Samsung SmartEther Long Password Forced Authentication
- | [15023] Samsung ADSL Modem Multiple Default Accounts
- | [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
- |_
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
- No OS matches for host
- Network Distance: 18 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 280.34 ms 10.252.204.1
- 2 280.41 ms 45.131.4.3
- 3 280.43 ms 109.236.95.228
- 4 280.45 ms hu0-1-0-3.ccr21.ams04.atlas.cogentco.com (149.11.38.225)
- 5 280.48 ms be3385.ccr42.ams03.atlas.cogentco.com (154.54.58.197)
- 6 280.53 ms ae-6.edge7.Amsterdam1.Level3.net (4.68.37.101)
- 7 ...
- 8 280.56 ms 213.19.197.62
- 9 ...
- 10 131.74 ms ae2.bbsa0106-01.ams3.bb.godaddy.com (188.121.32.5)
- 11 248.87 ms 188.121.32.64
- 12 ... 17
- 18 196.67 ms ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- NSE: Script Post-scanning.
- Initiating NSE at 13:45
- Completed NSE at 13:45, 0.00s elapsed
- Initiating NSE at 13:45
- Completed NSE at 13:45, 0.00s elapsed
- #######################################################################################################################################
- https://160.153.136.3 [404 Not Found] Cookies[dps_site_id], Country[UNITED STATES][US], HTTPServer[DPS/1.6.13], IP[160.153.136.3], UncommonHeaders[x-siteid], WebsiteTonight
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 13:45 EDT
- NSE: Loaded 163 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 13:45
- Completed NSE at 13:45, 0.00s elapsed
- Initiating NSE at 13:45
- Completed NSE at 13:45, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 13:45
- Completed Parallel DNS resolution of 1 host. at 13:45, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:45
- Scanning ip-160-153-136-3.ip.secureserver.net (160.153.136.3) [1 port]
- Discovered open port 443/tcp on 160.153.136.3
- Completed SYN Stealth Scan at 13:45, 0.29s elapsed (1 total ports)
- Initiating Service scan at 13:45
- Scanning 1 service on ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Completed Service scan at 13:46, 13.69s elapsed (1 service on 1 host)
- Initiating OS detection (try #1) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Retrying OS detection (try #2) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Initiating Traceroute at 13:46
- Completed Traceroute at 13:46, 3.32s elapsed
- Initiating Parallel DNS resolution of 10 hosts. at 13:46
- Completed Parallel DNS resolution of 10 hosts. at 13:46, 0.31s elapsed
- NSE: Script scanning 160.153.136.3.
- Initiating NSE at 13:46
- Completed NSE at 13:48, 142.97s elapsed
- Initiating NSE at 13:48
- Completed NSE at 13:48, 2.10s elapsed
- Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Host is up (0.26s latency).
- PORT STATE SERVICE VERSION
- 443/tcp open ssl/http Samsung AllShare httpd
- | http-brute:
- |_ Path "/" does not require authentication
- |_http-chrono: Request times for /; avg: 1141.96ms; min: 913.52ms; max: 1364.62ms
- |_http-csrf: Couldn't find any CSRF vulnerabilities.
- |_http-date: Tue, 22 Oct 2019 17:46:23 GMT; -3s from local time.
- |_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
- |_http-dombased-xss: Couldn't find any DOM based XSS.
- |_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
- | http-errors:
- | Spidering limited to: maxpagecount=40; withinhost=ip-160-153-136-3.ip.secureserver.net
- | Found the following error pages:
- |
- | Error Code: 404
- |_ https://ip-160-153-136-3.ip.secureserver.net:443/
- |_http-feed: Couldn't find any feeds.
- |_http-fetch: Please enter the complete path of the directory to save data in.
- | http-headers:
- | Content-Length: 3
- | Vary: Accept-Encoding
- | Server: DPS/1.6.13
- | X-SiteId: 4000
- | Set-Cookie: dps_site_id=4000; path=/; secure
- | Date: Tue, 22 Oct 2019 17:46:31 GMT
- | Connection: close
- |
- |_ (Request type: GET)
- |_http-jsonp-detection: Couldn't find any JSONP endpoints.
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-mobileversion-checker: No mobile version detected.
- | http-security-headers:
- | Strict_Transport_Security:
- | HSTS not configured in HTTPS Server
- | Cookie:
- |_ Cookies are secured with Secure Flag in HTTPS Connection
- |_http-server-header: DPS/1.6.13
- | http-sitemap-generator:
- | Directory structure:
- | Longest directory structure:
- | Depth: 0
- | Dir: /
- | Total files found (by extension):
- |_
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- |_http-title: Site doesn't have a title.
- | http-vhosts:
- |_127 names had status 404
- |_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
- |_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
- |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
- |_http-xssed: No previously reported XSS vuln.
- | vulscan: VulDB - https://vuldb.com:
- | [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
- | [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
- | [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
- | [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
- | [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
- | [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
- | [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
- | [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
- | [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
- | [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
- | [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
- | [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
- | [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
- | [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
- | [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
- | [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
- | [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
- | [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
- | [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
- | [124425] Samsung Members Intent privilege escalation
- | [124418] Samsung Internet Browser Object privilege escalation
- | [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
- | [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
- | [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
- | [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
- | [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
- | [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
- | [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
- | [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
- | [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
- | [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
- | [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
- | [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
- | [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
- | [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
- | [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
- | [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
- | [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
- | [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
- | [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
- | [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
- | [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
- | [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
- | [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
- | [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
- | [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
- | [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
- | [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
- | [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
- | [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
- | [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
- | [115288] Samsung Mobile Device N(7.x) APK privilege escalation
- | [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
- | [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
- | [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
- | [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
- | [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
- | [112195] Samsung Gear Bluetooth weak authentication
- | [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
- | [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
- | [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
- | [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
- | [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
- | [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
- | [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
- | [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
- | [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
- | [102728] Samsung Magician 5.0 TLS Certificate weak encryption
- | [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
- | [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
- | [99817] Samsung Galaxy S6 SecEmailSync sql injection
- | [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
- | [98938] Samsung Account up to 1.6/2.1 weak encryption
- | [98937] Samsung GALAXY Apps weak encryption
- | [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
- | [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
- | [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
- | [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
- | [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
- | [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
- | [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
- | [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
- | [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
- | [94604] Samsung DVR Web Viewer Cookie weak encryption
- | [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
- | [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
- | [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
- | [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
- | [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
- | [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
- | [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
- | [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
- | [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
- | [80263] Samsung SRN-1670D Web Viewer File information disclosure
- | [79057] Samsung Galaxy S6 JPEG Image memory corruption
- | [79056] Samsung Galaxy S6 GIF Image Crash denial of service
- | [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
- | [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
- | [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
- | [76316] Samsung SBeam 15000 NFC Connection information disclosure
- | [76087] Samsung Galaxy S5 createFromParcel memory corruption
- | [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
- | [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
- | [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
- | [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
- | [74213] Samsung Samsung Security Manager up to 1.29 denial of service
- | [73144] Samsung SmartViewer ActiveX Control memory corruption
- | [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
- | [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
- | [68531] Samsung Mobile Devices Remote Control Feature denial of service
- | [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
- | [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
- | [12842] Samsung TV D7000 SSID Authentication weak authentication
- | [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
- | [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
- | [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
- | [64793] Samsung Smart Viewer unknown vulnerability
- | [64792] Samsung Smart Viewer Web View Cleartext information disclosure
- | [9717] Samsung PS50C7700 HTTP Request denial of service
- | [9148] Samsung IP Camera URL Validator cross site scripting
- | [7892] Samsung UE55ES6800 SOAPACTION denial of service
- | [63280] Samsung SamsungDive Subsystem unknown vulnerability
- | [63277] Samsung SamsungDive Subsystem spoofing
- | [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
- | [7168] Samsung LED 3D Smart TV memory corruption
- | [63139] Samsung Kies Air 2.1.210161 Crash denial of service
- | [63138] Samsung Kies Air 2.1.210161 spoofing
- | [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
- | [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
- | [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
- | [61634] Samsung NET-i viewer 1.37.120316 denial of service
- | [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
- | [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
- | [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
- | [60919] Samsung Chromebox 3 unknown vulnerability
- | [5259] Samsung TV MAC Address memory corruption
- | [5258] Samsung TV Controller Packet denial of service
- | [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
- | [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
- |
- | MITRE CVE - https://cve.mitre.org:
- | [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
- | [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
- | [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
- | [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
- | [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
- | [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
- | [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
- | [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
- | [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
- | [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
- | [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
- | [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
- | [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
- | [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
- | [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
- | [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
- | [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
- | [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
- | [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
- | [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
- | [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
- | [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
- | [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
- | [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
- |
- | SecurityFocus - https://www.securityfocus.com/bid/:
- | [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
- | [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
- | [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
- | [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
- | [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
- | [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
- | [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
- | [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
- | [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
- | [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
- | [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
- | [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
- | [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
- | [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
- | [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
- | [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
- | [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
- | [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
- | [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
- | [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
- | [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
- | [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
- | [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
- | [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
- | [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
- | [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
- | [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
- | [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
- | [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
- | [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
- | [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
- | [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
- | [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
- | [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
- | [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
- | [84287] Samsung SW Update Tool Security Bypass Vulnerability
- | [84284] Samsung SW Update Tool Information Disclosure Vulnerability
- | [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
- | [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
- | [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
- | [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
- | [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
- | [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
- | [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
- | [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
- | [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
- | [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
- | [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
- | [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
- | [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
- | [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
- | [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
- | [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
- | [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
- | [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
- | [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
- | [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
- | [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
- | [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
- | [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
- | [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
- | [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
- | [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
- | [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
- | [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
- | [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
- | [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
- | [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
- | [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
- | [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
- | [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
- | [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
- | [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
- | [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
- | [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
- | [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
- | [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
- | [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
- | [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
- | [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
- | [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
- | [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
- | [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
- | [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
- | [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
- | [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
- | [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
- | [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
- | [55936] Samsung Kies Multiple Security Vulnerabilities
- | [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
- | [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
- | [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
- | [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
- | [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
- | [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
- | [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
- | [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
- | [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
- | [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
- | [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
- | [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
- | [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
- | [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
- |
- | IBM X-Force - https://exchange.xforce.ibmcloud.com:
- | [85904] Samsung PS50C7700 TV denial of service
- | [85190] Samsung Galaxy S4 spoofing
- | [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
- | [82662] Samsung TV SOAPACTION denial of service
- | [82602] Samsung Galaxy S III Lock Screen security bypass
- | [82352] Samsung Galaxy S III Passcode Lock security bypass
- | [80926] Samsung Galaxy security bypass
- | [80923] Samsung Galaxy SamsungDive information disclosure
- | [80886] Samsung SmartPhones privilege escalation
- | [80709] Samsung Galaxy S2 kernel privilege escalation
- | [80336] Samsung printers backdoor
- | [80092] Samsung Kies Air security bypass
- | [80091] Samsung Kies Air GET denial of service
- | [79445] Samsung Kies ActiveX Control registry key security bypass
- | [79443] Samsung Kies ActiveX Control security bypass
- | [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
- | [79283] Samsung Kies ActiveX CmdAgent.dll code execution
- | [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
- | [79193] Samsung Galaxy S III sandbox privilege escalation
- | [79192] Samsung Galaxy S III document viewer code execution
- | [78904] Samsung Galaxy S III USSD denial of service
- | [77811] Samsung Galaxy S2 Epic 4G Touch symlink
- | [76396] AllShare libpin3_dll.dll denial of service
- | [75310] Samsung NET-i viewer ActiveX control buffer overflow
- | [75070] Samsung NET-i ware ActiveX control buffer overflow
- | [75069] Samsung NET-i ware ActiveX control code execution
- | [75066] Samsung NET-i ware Master and Storage denial of service
- | [74928] Multiple Samsung TV and BD products string denial of service
- | [74927] Multiple Samsung TV and BD products controller packet denial of service
- | [71316] Samsung Omnia 7 RapiConfig.exe code execution
- | [67315] Samsung Integrated Management System DMS authentication form SQL Injection
- | [50110] Samsung SMS messages authentication bypass
- | [44995] Samsung DVR SHR2040 Web interface denial of service
- | [35502] Samsung SCX-4200 driver installation script privilege escalation
- | [19927] Samsung default accounts and passwords allow unauthorized access
- | [19925] Samsung ADSL Router information disclosure
- | [15973] Samsung SmartEther allows administrative access
- | [6845] Samsung ML-85G printer driver /tmp symlink
- |
- | Exploit-DB - https://www.exploit-db.com:
- | [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
- | [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
- | [27043] Samsung PS50C7700 TV - Denial of Service
- | [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
- | [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
- | [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
- | [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
- | [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
- | [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
- | [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
- | [18751] Samsung D6000 TV Multiple Vulnerabilities
- | [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
- |
- | OpenVAS (Nessus) - http://www.openvas.org:
- | [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
- |
- | SecurityTracker - https://www.securitytracker.com:
- | [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
- | [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
- | [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
- | [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
- | [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
- | [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
- | [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
- | [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
- | [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
- |
- | OSVDB - http://www.osvdb.org:
- | [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
- | [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
- | [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
- | [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
- | [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
- | [94223] Samsung Multiple IP Camera URI XSS
- | [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
- | [91498] Google Android on Samsung Multiple Unspecified DoS
- | [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
- | [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
- | [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
- | [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
- | [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
- | [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
- | [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
- | [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
- | [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
- | [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
- | [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
- | [88379] Samsung LED 3D TV Unspecified Remote Command Execution
- | [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
- | [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
- | [87872] Samsung Multiple Printers Hardcoded Admin Credentials
- | [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
- | [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
- | [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
- | [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
- | [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
- | [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
- | [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
- | [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
- | [79398] Samsung DWCD Web Interface Default Password (Femtocell)
- | [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
- | [72255] Samsung Data Management Server Default Hardcoded root Password
- | [72227] Samsung Data Management Server Unspecified SQL Injection
- | [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
- | [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
- | [54690] Samsung G3210 Web Interface Default Password
- | [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
- | [54688] Samsung G3210 FTP-Server Default Credentials
- | [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
- | [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
- | [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
- | [16684] Samsung SmartEther Long Password Forced Authentication
- | [15023] Samsung ADSL Modem Multiple Default Accounts
- | [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
- |_
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
- No OS matches for host
- Network Distance: 17 hops
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 188.03 ms 10.252.204.1
- 2 287.81 ms 45.131.4.3
- 3 287.78 ms 109.236.95.224
- 4 287.86 ms be4380.rcr21.rtm01.atlas.cogentco.com (149.6.110.73)
- 5 287.90 ms be3384.ccr41.ams03.atlas.cogentco.com (154.54.58.165)
- 6 287.89 ms ae-6.edge7.Amsterdam1.Level3.net (4.68.37.101)
- 7 287.99 ms THE-GO-DADD.ear3.Amsterdam1.Level3.net (213.19.197.58)
- 8 ...
- 9 288.00 ms ae3.bbsa0106-01.ams3.bb.godaddy.com (188.121.32.11)
- 10 288.02 ms 188.121.32.64
- 11 296.17 ms 188.121.32.64
- 12 ... 16
- 17 296.10 ms ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- NSE: Script Post-scanning.
- Initiating NSE at 13:48
- Completed NSE at 13:48, 0.00s elapsed
- Initiating NSE at 13:48
- Completed NSE at 13:48, 0.00s elapsed
- #######################################################################################################################################
- Version: 1.11.13-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 160.153.136.3
- Testing SSL server 160.153.136.3 on port 443 using SNI name 160.153.136.3
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits AES256-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: *.godaddysites.com
- Altnames: DNS:*.godaddysites.com, DNS:godaddysites.com
- Issuer: Go Daddy Secure Certificate Authority - G2
- Not valid before: Aug 3 16:00:21 2018 GMT
- Not valid after: Aug 3 16:00:21 2020 GMT
- #######################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 13:53 EDT
- NSE: Loaded 47 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 13:53
- Completed NSE at 13:53, 0.00s elapsed
- Initiating NSE at 13:53
- Completed NSE at 13:53, 0.00s elapsed
- Initiating Ping Scan at 13:53
- Scanning 160.153.136.3 [4 ports]
- Completed Ping Scan at 13:53, 0.15s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:53
- Completed Parallel DNS resolution of 1 host. at 13:53, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:53
- Scanning ip-160-153-136-3.ip.secureserver.net (160.153.136.3) [65535 ports]
- Discovered open port 443/tcp on 160.153.136.3
- Discovered open port 80/tcp on 160.153.136.3
- SYN Stealth Scan Timing: About 6.00% done; ETC: 14:01 (0:08:05 remaining)
- SYN Stealth Scan Timing: About 15.21% done; ETC: 13:59 (0:05:40 remaining)
- SYN Stealth Scan Timing: About 27.65% done; ETC: 13:58 (0:03:58 remaining)
- SYN Stealth Scan Timing: About 38.88% done; ETC: 13:58 (0:03:10 remaining)
- SYN Stealth Scan Timing: About 48.42% done; ETC: 13:58 (0:02:41 remaining)
- SYN Stealth Scan Timing: About 60.91% done; ETC: 13:58 (0:01:56 remaining)
- SYN Stealth Scan Timing: About 68.64% done; ETC: 13:58 (0:01:36 remaining)
- SYN Stealth Scan Timing: About 78.69% done; ETC: 13:58 (0:01:05 remaining)
- Completed SYN Stealth Scan at 13:58, 292.59s elapsed (65535 total ports)
- Initiating Service scan at 13:58
- Scanning 2 services on ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Completed Service scan at 13:58, 13.31s elapsed (2 services on 1 host)
- Initiating OS detection (try #1) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Retrying OS detection (try #2) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Initiating Traceroute at 13:58
- Completed Traceroute at 13:58, 0.21s elapsed
- Initiating Parallel DNS resolution of 2 hosts. at 13:58
- Completed Parallel DNS resolution of 2 hosts. at 13:58, 0.00s elapsed
- NSE: Script scanning 160.153.136.3.
- Initiating NSE at 13:58
- Completed NSE at 13:58, 7.64s elapsed
- Initiating NSE at 13:58
- Completed NSE at 13:58, 2.36s elapsed
- Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Host is up (0.20s latency).
- Not shown: 65530 filtered ports
- PORT STATE SERVICE VERSION
- 25/tcp closed smtp
- 80/tcp open http Samsung AllShare httpd
- |_http-server-header: DPS/1.6.13
- | vulscan: VulDB - https://vuldb.com:
- | [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
- | [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
- | [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
- | [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
- | [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
- | [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
- | [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
- | [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
- | [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
- | [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
- | [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
- | [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
- | [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
- | [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
- | [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
- | [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
- | [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
- | [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
- | [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
- | [124425] Samsung Members Intent privilege escalation
- | [124418] Samsung Internet Browser Object privilege escalation
- | [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
- | [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
- | [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
- | [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
- | [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
- | [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
- | [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
- | [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
- | [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
- | [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
- | [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
- | [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
- | [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
- | [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
- | [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
- | [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
- | [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
- | [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
- | [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
- | [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
- | [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
- | [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
- | [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
- | [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
- | [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
- | [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
- | [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
- | [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
- | [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
- | [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
- | [115288] Samsung Mobile Device N(7.x) APK privilege escalation
- | [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
- | [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
- | [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
- | [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
- | [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
- | [112195] Samsung Gear Bluetooth weak authentication
- | [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
- | [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
- | [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
- | [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
- | [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
- | [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
- | [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
- | [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
- | [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
- | [102728] Samsung Magician 5.0 TLS Certificate weak encryption
- | [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
- | [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
- | [99817] Samsung Galaxy S6 SecEmailSync sql injection
- | [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
- | [98938] Samsung Account up to 1.6/2.1 weak encryption
- | [98937] Samsung GALAXY Apps weak encryption
- | [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
- | [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
- | [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
- | [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
- | [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
- | [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
- | [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
- | [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
- | [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
- | [94604] Samsung DVR Web Viewer Cookie weak encryption
- | [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
- | [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
- | [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
- | [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
- | [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
- | [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
- | [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
- | [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
- | [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
- | [80263] Samsung SRN-1670D Web Viewer File information disclosure
- | [79057] Samsung Galaxy S6 JPEG Image memory corruption
- | [79056] Samsung Galaxy S6 GIF Image Crash denial of service
- | [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
- | [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
- | [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
- | [76316] Samsung SBeam 15000 NFC Connection information disclosure
- | [76087] Samsung Galaxy S5 createFromParcel memory corruption
- | [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
- | [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
- | [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
- | [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
- | [74213] Samsung Samsung Security Manager up to 1.29 denial of service
- | [73144] Samsung SmartViewer ActiveX Control memory corruption
- | [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
- | [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
- | [68531] Samsung Mobile Devices Remote Control Feature denial of service
- | [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
- | [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
- | [12842] Samsung TV D7000 SSID Authentication weak authentication
- | [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
- | [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
- | [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
- | [64793] Samsung Smart Viewer unknown vulnerability
- | [64792] Samsung Smart Viewer Web View Cleartext information disclosure
- | [9717] Samsung PS50C7700 HTTP Request denial of service
- | [9148] Samsung IP Camera URL Validator cross site scripting
- | [7892] Samsung UE55ES6800 SOAPACTION denial of service
- | [63280] Samsung SamsungDive Subsystem unknown vulnerability
- | [63277] Samsung SamsungDive Subsystem spoofing
- | [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
- | [7168] Samsung LED 3D Smart TV memory corruption
- | [63139] Samsung Kies Air 2.1.210161 Crash denial of service
- | [63138] Samsung Kies Air 2.1.210161 spoofing
- | [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
- | [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
- | [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
- | [61634] Samsung NET-i viewer 1.37.120316 denial of service
- | [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
- | [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
- | [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
- | [60919] Samsung Chromebox 3 unknown vulnerability
- | [5259] Samsung TV MAC Address memory corruption
- | [5258] Samsung TV Controller Packet denial of service
- | [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
- | [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
- |
- | MITRE CVE - https://cve.mitre.org:
- | [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
- | [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
- | [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
- | [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
- | [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
- | [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
- | [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
- | [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
- | [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
- | [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
- | [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
- | [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
- | [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
- | [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
- | [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
- | [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
- | [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
- | [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
- | [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
- | [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
- | [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
- | [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
- | [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
- | [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
- |
- | SecurityFocus - https://www.securityfocus.com/bid/:
- | [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
- | [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
- | [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
- | [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
- | [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
- | [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
- | [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
- | [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
- | [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
- | [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
- | [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
- | [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
- | [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
- | [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
- | [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
- | [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
- | [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
- | [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
- | [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
- | [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
- | [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
- | [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
- | [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
- | [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
- | [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
- | [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
- | [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
- | [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
- | [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
- | [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
- | [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
- | [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
- | [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
- | [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
- | [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
- | [84287] Samsung SW Update Tool Security Bypass Vulnerability
- | [84284] Samsung SW Update Tool Information Disclosure Vulnerability
- | [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
- | [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
- | [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
- | [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
- | [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
- | [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
- | [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
- | [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
- | [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
- | [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
- | [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
- | [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
- | [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
- | [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
- | [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
- | [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
- | [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
- | [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
- | [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
- | [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
- | [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
- | [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
- | [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
- | [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
- | [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
- | [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
- | [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
- | [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
- | [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
- | [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
- | [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
- | [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
- | [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
- | [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
- | [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
- | [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
- | [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
- | [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
- | [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
- | [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
- | [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
- | [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
- | [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
- | [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
- | [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
- | [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
- | [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
- | [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
- | [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
- | [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
- | [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
- | [55936] Samsung Kies Multiple Security Vulnerabilities
- | [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
- | [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
- | [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
- | [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
- | [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
- | [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
- | [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
- | [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
- | [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
- | [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
- | [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
- | [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
- | [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
- | [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
- |
- | IBM X-Force - https://exchange.xforce.ibmcloud.com:
- | [85904] Samsung PS50C7700 TV denial of service
- | [85190] Samsung Galaxy S4 spoofing
- | [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
- | [82662] Samsung TV SOAPACTION denial of service
- | [82602] Samsung Galaxy S III Lock Screen security bypass
- | [82352] Samsung Galaxy S III Passcode Lock security bypass
- | [80926] Samsung Galaxy security bypass
- | [80923] Samsung Galaxy SamsungDive information disclosure
- | [80886] Samsung SmartPhones privilege escalation
- | [80709] Samsung Galaxy S2 kernel privilege escalation
- | [80336] Samsung printers backdoor
- | [80092] Samsung Kies Air security bypass
- | [80091] Samsung Kies Air GET denial of service
- | [79445] Samsung Kies ActiveX Control registry key security bypass
- | [79443] Samsung Kies ActiveX Control security bypass
- | [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
- | [79283] Samsung Kies ActiveX CmdAgent.dll code execution
- | [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
- | [79193] Samsung Galaxy S III sandbox privilege escalation
- | [79192] Samsung Galaxy S III document viewer code execution
- | [78904] Samsung Galaxy S III USSD denial of service
- | [77811] Samsung Galaxy S2 Epic 4G Touch symlink
- | [76396] AllShare libpin3_dll.dll denial of service
- | [75310] Samsung NET-i viewer ActiveX control buffer overflow
- | [75070] Samsung NET-i ware ActiveX control buffer overflow
- | [75069] Samsung NET-i ware ActiveX control code execution
- | [75066] Samsung NET-i ware Master and Storage denial of service
- | [74928] Multiple Samsung TV and BD products string denial of service
- | [74927] Multiple Samsung TV and BD products controller packet denial of service
- | [71316] Samsung Omnia 7 RapiConfig.exe code execution
- | [67315] Samsung Integrated Management System DMS authentication form SQL Injection
- | [50110] Samsung SMS messages authentication bypass
- | [44995] Samsung DVR SHR2040 Web interface denial of service
- | [35502] Samsung SCX-4200 driver installation script privilege escalation
- | [19927] Samsung default accounts and passwords allow unauthorized access
- | [19925] Samsung ADSL Router information disclosure
- | [15973] Samsung SmartEther allows administrative access
- | [6845] Samsung ML-85G printer driver /tmp symlink
- |
- | Exploit-DB - https://www.exploit-db.com:
- | [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
- | [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
- | [27043] Samsung PS50C7700 TV - Denial of Service
- | [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
- | [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
- | [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
- | [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
- | [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
- | [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
- | [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
- | [18751] Samsung D6000 TV Multiple Vulnerabilities
- | [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
- |
- | OpenVAS (Nessus) - http://www.openvas.org:
- | [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
- |
- | SecurityTracker - https://www.securitytracker.com:
- | [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
- | [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
- | [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
- | [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
- | [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
- | [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
- | [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
- | [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
- | [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
- |
- | OSVDB - http://www.osvdb.org:
- | [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
- | [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
- | [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
- | [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
- | [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
- | [94223] Samsung Multiple IP Camera URI XSS
- | [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
- | [91498] Google Android on Samsung Multiple Unspecified DoS
- | [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
- | [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
- | [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
- | [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
- | [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
- | [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
- | [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
- | [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
- | [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
- | [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
- | [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
- | [88379] Samsung LED 3D TV Unspecified Remote Command Execution
- | [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
- | [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
- | [87872] Samsung Multiple Printers Hardcoded Admin Credentials
- | [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
- | [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
- | [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
- | [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
- | [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
- | [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
- | [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
- | [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
- | [79398] Samsung DWCD Web Interface Default Password (Femtocell)
- | [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
- | [72255] Samsung Data Management Server Default Hardcoded root Password
- | [72227] Samsung Data Management Server Unspecified SQL Injection
- | [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
- | [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
- | [54690] Samsung G3210 Web Interface Default Password
- | [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
- | [54688] Samsung G3210 FTP-Server Default Credentials
- | [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
- | [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
- | [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
- | [16684] Samsung SmartEther Long Password Forced Authentication
- | [15023] Samsung ADSL Modem Multiple Default Accounts
- | [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
- |_
- 139/tcp closed netbios-ssn
- 443/tcp open ssl/http Samsung AllShare httpd
- |_http-server-header: DPS/1.6.13
- | vulscan: VulDB - https://vuldb.com:
- | [141719] Samsung Device SIMalliance Toolbox Browser SMS Message information disclosure
- | [136176] Samsung GALAXY Apps up to 4.4.01 Signature Validation SSL Certificate Code Execution
- | [135896] Samsung Galaxy S9 up to 1.4.20 GameServiceReceiver Update Code Execution memory corruption
- | [135895] Samsung Galaxy S9 Captive Portal Code Execution memory corruption
- | [135894] Samsung Galaxy S9 ASN.1 Parser Heap-based memory corruption
- | [135557] Samsung SCX-824 swsAlert.sws Parameter cross site scripting
- | [132053] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service loginView.sws Parameter cross site scripting
- | [132052] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service networkinformationView.sws Application cross site scripting
- | [132051] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 Web Service /sws/leftmenu.sws Parameter cross site scripting
- | [132050] Samsung X7400GX Syncthru V6.A6.25 V11.01.05.25_08-21-2015 /sws/swsAlert.sws Parameter cross site scripting
- | [131870] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver prot_get_ring_space memory corruption
- | [128021] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_create_response memory corruption
- | [128020] Samsung Galaxy S6 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_flush_response memory corruption
- | [128019] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_pcie.c dhd_bus_flow_ring_delete_response memory corruption
- | [128018] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 Wi-Fi Driver dhd_msgbuf.c dhd_prot_txdata_write_flush denial of service
- | [128017] Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 bcmdhd4358 Wi-Fi Driver dhd_linux.c dhd_rx_frame memory corruption
- | [127726] LibRaw up to 0.18.8 dcraw_common.cpp samsung_load_raw() memory corruption
- | [124772] Samsung SCX-6545X 2.00.03.01 SNMP Service SNMP Request Cleartext information disclosure
- | [124428] Samsung Galaxy S8 G950FXXU1AQL5 IPCP Header Stack-based memory corruption
- | [124425] Samsung Members Intent privilege escalation
- | [124418] Samsung Internet Browser Object privilege escalation
- | [124392] Samsung SmartThings Hub Video-Core HTTP Server HTTP Request Stack-based memory corruption
- | [124391] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server /cameras/XXXX/clips memory corruption
- | [124390] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124389] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124388] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124387] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core HTTP Server memory corruption
- | [124323] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
- | [124322] Samsung SmartThings Hub STH-ETH-250 0.20.17 WifiScan memory corruption
- | [123822] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials Stack-based memory corruption
- | [123813] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
- | [123812] Samsung SmartThings Hub 0.20.17 Video-Core Process /cameras/XXXX/clips memory corruption
- | [123346] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests privilege escalation
- | [123345] Samsung SmartThings Hub STH-ETH-250 0.20.17 /cameras/XXXX/clips memory corruption
- | [123294] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore information disclosure
- | [123293] Samsung SmartThings Hub STH-ETH-250 0.20.17 hubCore Process HTTP Request denial of service
- | [123292] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123291] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process /cameras/XXXX/clips HTTP Request memory corruption
- | [123202] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests REST privilege escalation
- | [123201] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests JSON privilege escalation
- | [123195] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Cookie Heap-based memory corruption
- | [123194] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Requests Stack-based memory corruption
- | [123193] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123192] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process Stack-based sql injection
- | [123191] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Header Injection privilege escalation
- | [123190] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123189] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123188] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123187] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based sql injection
- | [123186] Samsung SmartThings Hub STH-ETH-250 0.20.17 Credentials HTTP Requests JSON sql injection
- | [123185] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core Stack-based memory corruption
- | [123184] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Request Stack-based memory corruption
- | [123183] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video Core HTTP Requests Stack-based memory corruption
- | [123182] Samsung SmartThings Hub STH-ETH-250 0.20.17 samsungWifiScan JSON Stack-based memory corruption
- | [123181] Samsung SmartThings Hub STH-ETH-250 0.20.17 Video-Core Process HTTP Request Stack-based memory corruption
- | [123180] Samsung SmartThings Hub STH-ETH-250 0.20.17 URL Space command injection
- | [122598] Samsung Syncthru Web Service 4.05.61 printReportSetupView.sws cross site request forgery
- | [122594] Samsung Syncthru Web Service 4.05.61 Parameter cross site scripting
- | [119556] Samsung DVR Web Viewer webviewer_login_page cross site scripting
- | [118345] Samsung S7 Edge OMACP WAP Push Message Integer Overflow memory corruption
- | [115289] Samsung Mobile Device M(6.0)/N(7.x) sensorhub binder Service Heap-based memory corruption
- | [115288] Samsung Mobile Device N(7.x) APK privilege escalation
- | [115287] Samsung Mobile Device L(5.x)/M(6.0)/N(7.x) Gallery BMP File memory corruption
- | [115286] Samsung Mobile Device M(6.0) Email Application cross site scripting
- | [115285] Samsung Mobile Device N(7.x) Frame Size Code Execution memory corruption
- | [114128] Samsung Display Solutions App up to 3.01 on Android B2B Content Man-in-the-Middle weak encryption
- | [113616] Knox SDS IAM/SDS EMM 16.11 on Samsung Mobile weak encryption
- | [112195] Samsung Gear Bluetooth weak authentication
- | [111380] Samsung Mobile Devices N Exynos Chipset Stack-based memory corruption
- | [111034] Samsung S6 Edge SecEmailComposer/EmailComposer Crafted Application information disclosure
- | [111060] Samsung Internet Browser 6.2.01.12 IFRAME Cross-Origin privilege escalation
- | [110950] Samsung Internet Browser Same-Origin Policy privilege escalation
- | [109165] Samsung SRN-1670D Web Viewer network_ssl_upload.php privilege escalation
- | [107581] Intel Puma 5/6/7 on Samsung Packet denial of service
- | [106347] Samsung NVR cgi-bin/main-cgi JSON Data information disclosure
- | [105699] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver memory corruption
- | [105698] Samsung S4 GT-I9500 up to 3.4 samsung_extdisp Driver information disclosure
- | [102728] Samsung Magician 5.0 TLS Certificate weak encryption
- | [102047] Samsung S6 Edge WifiHs20UtilityService directory traversal
- | [101886] Samsung SyncThru 6 upload/updateDriver Parameter directory traversal
- | [99817] Samsung Galaxy S6 SecEmailSync sql injection
- | [99586] Samsung Galaxy S6 SecEmailUI HTML Email cross site scripting
- | [98938] Samsung Account up to 1.6/2.1 weak encryption
- | [98937] Samsung GALAXY Apps weak encryption
- | [98471] Samsung Phone 6.0/7.0 GPU Driver mali_kbase_core_linux.c kbase_dispatch Out-of-Bounds unknown vulnerability
- | [96306] Samsung Exynos fimg2d Driver on Android NULL Pointer Dereference denial of service
- | [95522] Samsung Exynos fimg2d Driver on Android Use-After-Free memory corruption
- | [95507] Samsung Note 5.0/5.1/6.0 SmartCall Activity Crash denial of service
- | [95506] Samsung Note 5.0/5.1/6.0 SpamCall Activity Crash denial of service
- | [95209] Samsung Note 4.4/5.0/5.1/6.0 VR Service Thread Crash denial of service
- | [95208] Samsung Note 5.0/5.1/6.0/7.0 SystemUI Crash denial of service
- | [95104] Samsung Mobile Phone 4.4/5.0/5.1/6.0 Application Installation std::bad_alloc denial of service
- | [94663] Samsung Galaxy S6 Edge Notification Listener information disclosure
- | [94604] Samsung DVR Web Viewer Cookie weak encryption
- | [94552] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [94551] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [94550] Samsung Note 5.0/5.1/6.0/7.0 Telecom memory corruption
- | [93581] Samsung Note 4.4/5.0/5.1 SystemUI Integer denial of service
- | [93303] Samsung Mobile L(5.0/5.1)/M(6.0) fimg2d Driver NULL Pointer Dereference memory corruption
- | [93199] Samsung Galaxy S4/S5/S6/S7 OMACP Message Config privilege escalation
- | [93198] Samsung Galaxy S4/S5/S6/S7 OMACP Message libomacp.so memory corruption
- | [93197] Samsung Galaxy S4/S5/S6/S7 OTA WAP PUSH SMS wifi-service.jar WifiServiceImpl denial of service
- | [93196] Samsung Galaxy S4/S5/S6/S7 BroadcastReceiver wifi-service.jar privilege escalation
- | [91709] Samsung Mobile Phone L(5.0/5.1)/M(6.0) SystemUI NULL Pointer Dereference denial of service
- | [80265] Samsung SRN-1670D Web Viewer XOR weak encryption
- | [80264] Samsung SRN-1670D Web Viewer Credentials information disclosure
- | [80263] Samsung SRN-1670D Web Viewer File information disclosure
- | [79057] Samsung Galaxy S6 JPEG Image memory corruption
- | [79056] Samsung Galaxy S6 GIF Image Crash denial of service
- | [79053] Samsung Galaxy S6 Bitmap Out-of-Bounds denial of service
- | [78999] Samsung SmartViewer CNC_Ctrl Control rtsp_getdlsendtime memory corruption
- | [78998] Samsung SmartViewer DVRSetupSave/SendCustomPacket memory corruption
- | [76316] Samsung SBeam 15000 NFC Connection information disclosure
- | [76087] Samsung Galaxy S5 createFromParcel memory corruption
- | [76021] Swiftkey Keyboard on Samsung Galaxy Language Pack Update /data/dalvik-cache directory traversal
- | [75985] Samsung Galaxy S4/S5/S6 Swiftkey Keyboard+ Emoji Language Pack privilege escalation
- | [75176] Samsung Security Manager up to 1.30 HTTP Request privilege escalation
- | [74288] Samsung iPOLiS Device Manager 1.12.2 OCX ActiveX Control XnsSdkDeviceIpInstaller.ocx WriteConfigValue memory corruption
- | [74213] Samsung Samsung Security Manager up to 1.29 denial of service
- | [73144] Samsung SmartViewer ActiveX Control memory corruption
- | [73143] Samsung SmartViewer ActiveX Control Stack-Based memory corruption
- | [68234] Samsung Galaxy Ace 4/Note 3/S4/S5 KNOX memory corruption
- | [68531] Samsung Mobile Devices Remote Control Feature denial of service
- | [70020] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control memory corruption
- | [69949] Samsung iPOLiS Device Manager up to 1.8.1 ActiveX Control Stack-Based memory corruption
- | [12842] Samsung TV D7000 SSID Authentication weak authentication
- | [66860] Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll memory corruption
- | [12571] Samsung Nexus/Galaxy Modem libsec-ril.so RFS Command privilege escalation
- | [10120] Infraware Polaris Office/Viewer 4.0.3207.11 on Samsung Galaxy S3/S4 XML Validation denial of service
- | [64793] Samsung Smart Viewer unknown vulnerability
- | [64792] Samsung Smart Viewer Web View Cleartext information disclosure
- | [9717] Samsung PS50C7700 HTTP Request denial of service
- | [9148] Samsung IP Camera URL Validator cross site scripting
- | [7892] Samsung UE55ES6800 SOAPACTION denial of service
- | [63280] Samsung SamsungDive Subsystem unknown vulnerability
- | [63277] Samsung SamsungDive Subsystem spoofing
- | [7175] Google Android on Samsung Exynos 4210/4412 Privileges /dev/exynos-mem privilege escalation
- | [7168] Samsung LED 3D Smart TV memory corruption
- | [63139] Samsung Kies Air 2.1.210161 Crash denial of service
- | [63138] Samsung Kies Air 2.1.210161 spoofing
- | [7027] Samsung Printer 20121030 SNMP Account NetWorkManager.class NetworkManager Community String weak authentication
- | [6630] Samsung Galaxy S S2/S3 NFC privilege escalation
- | [61785] Samsung KIES 2.3.2.12074 ActiveX Control MASetupCaller.dll unknown vulnerability
- | [61634] Samsung NET-i viewer 1.37.120316 denial of service
- | [61633] Samsung NET-i viewer 1.37.120316 ActiveX Control memory corruption
- | [61632] Samsung NET-i viewer 1.37.120316 ActiveX Control Stack-based memory corruption
- | [61562] Samsung NET-i viewer 1.37 OCX ActiveX Control XProcessControl.ocx RequestScreenOptimization memory corruption
- | [60919] Samsung Chromebox 3 unknown vulnerability
- | [5259] Samsung TV MAC Address memory corruption
- | [5258] Samsung TV Controller Packet denial of service
- | [57396] Samsung Data Management Server up to 1.4.1 Authentication Form sql injection
- | [44300] Samsung DVR SHR2040 B3.03e-k1.53-v2.19 0705281908 Crash denial of service
- |
- | MITRE CVE - https://cve.mitre.org:
- | [CVE-2013-4890] The DMCRUIS/0.1 web server on the Samsung PS50C7700 TV allows remote attackers to cause a denial of service (daemon crash) via a long URI to TCP port 5600.
- | [CVE-2013-2310] SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application before 1.7.1, SoftBank Windows Mobile smartphones with the WISPrClient application before 1.3.1, SoftBank Disney Mobile Android smartphones with the Wi-Fi application before 1.7.1, and WILLCOM Android smartphones with the Wi-Fi application before 1.7.1, does not properly connect to access points, which allows remote attackers to obtain sensitive information by leveraging access to an 802.11 network.
- | [CVE-2012-6422] The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
- | [CVE-2012-6337] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices shows the activation of remote tracking, which might allow physically proximate attackers to defeat a product-recovery effort by tampering with this feature or its location data.
- | [CVE-2012-6334] The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
- | [CVE-2012-5859] Samsung Kies Air 2.1.207051 and 2.1.210161 allows remote attackers to cause a denial of service (crash) via a crafted request to www/apps/KiesAir/jws/ssd.php.
- | [CVE-2012-5858] Samsung Kies Air 2.1.207051 and 2.1.210161 relies on the IP address for authentication, which allows remote man-in-the-middle attackers to read arbitrary phone contents by spoofing or controlling the IP address.
- | [CVE-2012-4964] The Samsung printer firmware before 20121031 has a hardcoded read-write SNMP community, which makes it easier for remote attackers to obtain administrative access via an SNMP request.
- | [CVE-2012-4335] Samsung NET-i viewer 1.37.120316 allows remote attackers to cause a denial of service (infinite loop) via a negative size value in a TCP request to (1) NiwMasterService or (2) NiwStorageService. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4334] The ConnectDDNS method in the (1) STWConfigNVR 1.1.13.15 and (2) STWConfig 1.1.14.13 ActiveX controls in Samsung NET-i viewer 1.37.120316 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4333] Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
- | [CVE-2012-4330] The Samsung D6000 TV and possibly other products allows remote attackers to cause a denial of service (crash) via a long string in certain fields, as demonstrated by the MAC address field, possibly a buffer overflow.
- | [CVE-2012-4329] The Samsung D6000 TV and possibly other products allow remote attackers to cause a denial of service (continuous restart) via a crafted controller name.
- | [CVE-2012-4250] Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
- | [CVE-2012-4050] Multiple unspecified vulnerabilities in Google Chrome OS before 21.0.1180.50 on the Cr-48 and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, have unknown impact and attack vectors.
- | [CVE-2012-2990] The MASetupCaller ActiveX control before 1.4.2012.508 in MASetupCaller.dll in MarkAny ContentSAFER, as distributed in Samsung KIES before 2.3.2.12074_13_13, does not properly implement unspecified methods, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted HTML document.
- | [CVE-2012-2980] The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
- | [CVE-2012-2864] Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."
- | [CVE-2012-2619] The Broadcom BCM4325 and BCM4329 Wi-Fi chips, as used in certain Acer, Apple, Asus, Ford, HTC, Kyocera, LG, Malata, Motorola, Nokia, Pantech, Samsung, and Sony products, allow remote attackers to cause a denial of service (out-of-bounds read and Wi-Fi outage) via an RSN 802.11i information element.
- | [CVE-2012-1418] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.60 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2012-0695] Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-4719] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-4548] Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.44 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-3421] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.125 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2011-3420] Multiple unspecified vulnerabilities in Google Chrome before 14.0.835.157 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
- | [CVE-2010-4284] SQL injection vulnerability in the authentication form in the integrated web server in the Data Management Server (DMS) before 1.4.3 in Samsung Integrated Management System allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
- | [CVE-2008-4380] The web interface in Samsung DVR SHR2040 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, related to the filter for configuration properties and "/x" characters.
- | [CVE-2007-3931] The wrap_setuid_third_party_application function in the installation script for the Samsung SCX-4200 Driver 2.00.95 adds setuid permissions to third party applications such as xsane and xscanimage, which allows local users to gain privileges.
- | [CVE-2007-3445] Buffer overflow in SJ Labs SJphone 1.60.303c, running under Windows Mobile 2003 on the Samsung SCH-i730 phone, allows remote attackers to cause a denial of service (device hang and call termination) via a malformed SIP INVITE message, a different vulnerability than CVE-2007-3351.
- | [CVE-2005-0865] Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
- | [CVE-2005-0864] The Boa web server, as used in Samsung ADSL Modem SMDK8947v1.2 and possibly other products, allows remote attackers to read arbitrary files via a full pathname in the HTTP request.
- | [CVE-2004-1970] Samsung SmartEther SS6215S switch, and possibly other Samsung switches, allows remote attackers and local users to gain administrative access by providing the admin username followed by a password that is the maximum allowed length, then pressing the enter key after the resulting error message.
- | [CVE-2001-1177] ml85p in Samsung ML-85G GDI printer driver before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
- |
- | SecurityFocus - https://www.securityfocus.com/bid/:
- | [54055] Samsung AllShare 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability
- | [102336] Samsung/Seagate Self-Encrypting Drive Protection CVE-2015-7267 Local Security Bypass Vulnerability
- | [102334] Samsung/Seagate Self-Encrypting Drives Protection CVE-2015-7268 Local Security Bypass Vulnerability
- | [99081] Samsung Magician CVE-2017-3218 Remote Code Execution Vulnerability
- | [97703] Multiple Samsung Galaxy Products CVE-2016-4031 Security Bypass Vulnerability
- | [97701] Multiple Samsung Galaxy Products CVE-2016-4030 Security Bypass Vulnerability
- | [97658] Samsung SecEmailSync CVE-2016-2565 Information Disclosure Vulnerability
- | [97654] Samsung SecEmailSync CVE-2016-2566 SQL Injection Vulnerability
- | [97650] Multiple Samsung Galaxy Products CVE-2016-4032 Security Bypass Vulnerability
- | [97207] Samsung Account CVE-2015-0864 Information Disclosure Vulnerability
- | [96360] Multiple Samsung Android Mobile Devices CVE-2016-4547 Denial of Service Vulnerability
- | [96128] Multiple Samsung Android Mobile Devices InputMethod Application Denial of Service Vulnerability
- | [95674] Samsung CVE-2017-5538 Remote Memory Corruption Vulnerability
- | [95424] Multiple Samsung Android Mobile Devices CVE-2017-5350 Denial of Service Vulnerability
- | [95418] Multiple Samsung Android Mobile Devices CVE-2017-5351 Denial of Service Vulnerability
- | [95319] Multiple Samsung Android Mobile Phones CVE-2017-5217 Denial of Service Vulnerability
- | [95134] Multiple Samsung Devices 'OTP' Service Remote Heap Buffer Overflow Vulnerability
- | [95092] Multiple Samsung Galaxy Product Information Disclosure Vulnerability
- | [94955] Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
- | [94494] Multiple Samsung Galaxy Product CVE-2016-9567 Security Bypass Vulnerability
- | [94292] Samsung Mobile Phones SystemUI CVE-2016-9277 Denial of Service Vulnerability
- | [94283] Samsung Mobile Phones Information Disclosure and Denial of Service Vulnerabilities
- | [94120] Samsung Mobile Phones CVE-2016-7160 Null Pointer Dereference Denial of Service Vulnerability
- | [94088] Multiple Samsung Galaxy Product CVE-2016-7991 Security Bypass Vulnerability
- | [94086] Multiple Samsung Galaxy Devices CVE-2016-7990 Integer Overflow Vulnerability
- | [94082] Multiple Samsung Galaxy Devices CVE-2016-7989 Denial of Service Vulnerability
- | [94081] Samsung Mobile Phones CVE-2016-7988 Denial of Service Vulnerability
- | [92539] Samsung Security Manager Multiple Remote Command Execution and Denial of Service Vulnerabilities
- | [92349] Samsung 'fimg2d' Driver Null Pointer Deference Local Denial of Service Vulnerability
- | [92330] Samsung Android Phone Multiple Privilege Escalation Vulnerabilities
- | [91191] Samsung SW Update Software Local Privilege Escalation Vulnerability
- | [90104] Samsung Mobile Phones 'IAndroidShm' Service Denial of Service Vulnerability
- | [90100] Samsung Mobile Phones 'TvoutService_C' Service Denial of Service Vulnerability
- | [86366] Samsung 'msm_sensor_config' Function CVE-2016-4038 Remote Memory Corruption Vulnerability
- | [86278] Samsung KNOX CVE-2016-3996 Information Disclosure Vulnerability
- | [84287] Samsung SW Update Tool Security Bypass Vulnerability
- | [84284] Samsung SW Update Tool Information Disclosure Vulnerability
- | [81063] Samsung KNOX CVE-2016-1920 Man in the Middle Information Disclosure Vulnerability
- | [81056] Samsung KNOX CVE-2016-1919 Weak Encryption Security Weakness
- | [80381] Samsung SRN-1670D Camera Multiple Security Vulnerabilities
- | [79675] Samsung SmartTV and Printers CVE-2015-5729 Weak Password Security Vulnerability
- | [77431] Samsung SecEmailUI CVE-2015-7893 Security Vulnerability
- | [77430] Samsung Galaxy S6 CVE-2015-7898 Denial of Service Vulnerability
- | [77429] Samsung Galaxy S6 CVE-2015-7895 Denial of Service Vulnerability
- | [77425] Samsung LibQjpeg CVE-2015-7896 Remote Memory Corruption Vulnerability
- | [77423] Samsung LibQjpeg CVE-2015-7894 Remote Memory Corruption Vulnerability
- | [77422] Samsung Galaxy S6 CVE-2015-7897 Memory Corruption Vulnerability
- | [77339] Samsung SecEmailComposer CVE-2015-7889 Local Privilege Escalation Vulnerability
- | [77338] Samsung Galaxy S6 CVE-2015-7888 Directory Traversal Vulnerability
- | [77337] Samsung m2m1shot Driver CVE-2015-7892 Local Buffer Overflow Vulnerability
- | [77336] Samsung Sieren Kernel Driver CVE-2015-7890 Local Buffer Overflow Vulnerability
- | [77335] Samsung Fimg2d CVE-2015-7891 Local Race Condition Security Bypass Vulnerability
- | [77084] Samsung SmartViewer 'CNC_Ctrl' ActiveX Control Remote Code Execution Vulnerability
- | [77083] RETIRED: Samsung SmartViewer 'SendCustomPacket' Method Remote Code Execution Vulnerability
- | [77079] Samsung SmartViewer CVE-2015-8039 Multiple Remote Code Execution Vulnerabilities
- | [76946] Samsung XNS ActiveX SDK ActiveX Control Multiple Remote Code Execution Vulnerabilities
- | [76807] Samsung S4 GT-I9500 Memory Corruption and Information Disclosure Vulnerabilities
- | [75912] Samsung SyncThru CVE-2015-5473 Multiple Directory Traversal Vulnerabilities
- | [75404] Samsung SBeam CVE-2015-4033 Information Disclosure Vulnerability
- | [75403] Samsung Galaxy S5 CVE-2015-4034 Remote Code Execution Vulnerability
- | [75229] RETIRED: Samsung Galaxy S Phones CVE-2015-2865 Man in The Middle Security Bypass Vulnerability
- | [74877] Samsung iPOLiS Device Manager ActiveX Control CVE-2015-0555 Multiple Buffer Overflow Vulnerabilities
- | [74400] Samsung Security Manager ActiveMQ Broker Service Multiple Remote Code Execution Vulnerabilities
- | [72598] Samsung Security Manager CVE-2015-1499 Security Bypass Vulnerability
- | [71489] Samsung SmartViewer 'STWConfig' ActiveX Remote Code Execution Vulnerability
- | [71486] Samsung SmartViewer 'CNC_Ctrl' ActiveX Stack Buffer Overflow Vulnerability
- | [71148] Multiple Samsung Galaxy Devices KNOX Arbitrary Code Execution Vulnerability
- | [67823] Samsung iPOLiS Device Manager 'FindConfigChildeKeyList()' Method Stack Buffer Overflow Vulnerability
- | [67822] Samsung iPOLiS Device Manager ActiveX Control Multiple Remote Code Execution Vulnerabilities
- | [66192] Samsung Proprietary Android Backdoor Unauthorized Access Vulnerability
- | [63726] Samsung Galaxy S4 Unspecified Security Vulnerability
- | [61942] Samsung DVR CVE-2013-3585 Information Disclosure Vulnerability
- | [61938] Samsung DVR CVE-2013-3586 Cookie Authentication Bypass Vulnerability
- | [61881] Samsung DVR Multiple Access Bypass Vulnerabilities
- | [61391] Samsung PS50C7700 3D Plasma-TV CVE-2013-4890 Denial of Service Vulnerability
- | [61281] Samsung Galaxy S3 And S4 CVE-2013-4764 Local Security Bypass Vulnerability
- | [61280] Samsung Galaxy S3 And S4 CVE-2013-4763 Local Security Bypass Vulnerability
- | [60756] Samsung Galaxy S4 SMS Spoofing Vulnerability
- | [60527] Samsung SHR-5162 and SHR-5082 CVE-2013-3964 Unspecified Cross Site Scripting Vulnerability
- | [58320] Samsung TV 'SOAPACTION' Denial of Service Vulnerability
- | [58312] Samsung Galaxy S3 Full Lock Screen Security Bypass Vulnerability
- | [58123] Samsung Galaxy S3 Screen Lock Security Bypass Vulnerability
- | [57249] Samsung Kies CVE-2012-6429 Remote Buffer Overflow Vulnerability
- | [57131] SamsungDive for Android CVE-2012-6337 Spoofing Vulnerability
- | [57127] SamsungDive for Android CVE-2012-6334 Spoofing Vulnerability
- | [56955] Samsung SmartPhones Local Privilege Escalation Vulnerability
- | [56692] Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability
- | [56560] Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
- | [55936] Samsung Kies Multiple Security Vulnerabilities
- | [55053] Samsung Galaxy S2 Epic 4G Touch Multiple Insecure Temporary File Creation Vulnerabilities
- | [55047] Multiple Samsung and HTC Devices Information Disclosure Vulnerability
- | [53317] Samsung NET-i Viewer 'msls31.dll' ActiveX Buffer Overflow Vulnerability
- | [53193] Samsung NET-i ware Multiple Remote Vulnerabilities
- | [53161] Samsung TV and BD Products Multiple Denial Of Service Vulnerabilities
- | [50682] Samsung Omnia 7 'RapidConfig.exe' XML Provision Remote Code Execution Vulnerability
- | [47746] Samsung Integrated Management System DMS SQL Injection Vulnerability
- | [34705] Multiple Samsung Devices SMS Provisioning Messages Authentication Bypass Vulnerability
- | [31047] Samsung DVR SHR-2040 HTTPD Denial of Service Vulnerability
- | [24953] Samsung Linux Printer Driver SetUID Script Local Privilege Escalation Vulnerability
- | [16517] Samsung E730 Phone Remote Denial of Service Vulnerability
- | [12864] Samsung DSL Modem Multiple Remote Vulnerabilities
- | [10219] Samsung SmartEther Switch Firmware Authentication Bypass Vulnerability
- | [3008] Samsung ml85p Printer Utility Insecure Temporary File Creation Vulnerability
- |
- | IBM X-Force - https://exchange.xforce.ibmcloud.com:
- | [85904] Samsung PS50C7700 TV denial of service
- | [85190] Samsung Galaxy S4 spoofing
- | [84925] Samsung SHR Series IP cameras unspecified cross-site scripting
- | [82662] Samsung TV SOAPACTION denial of service
- | [82602] Samsung Galaxy S III Lock Screen security bypass
- | [82352] Samsung Galaxy S III Passcode Lock security bypass
- | [80926] Samsung Galaxy security bypass
- | [80923] Samsung Galaxy SamsungDive information disclosure
- | [80886] Samsung SmartPhones privilege escalation
- | [80709] Samsung Galaxy S2 kernel privilege escalation
- | [80336] Samsung printers backdoor
- | [80092] Samsung Kies Air security bypass
- | [80091] Samsung Kies Air GET denial of service
- | [79445] Samsung Kies ActiveX Control registry key security bypass
- | [79443] Samsung Kies ActiveX Control security bypass
- | [79284] Samsung Kies ActiveX Control CmdAgentLib() security bypass
- | [79283] Samsung Kies ActiveX CmdAgent.dll code execution
- | [79268] Samsung Kies Samsung.Device Service ActiveX control denial of service
- | [79193] Samsung Galaxy S III sandbox privilege escalation
- | [79192] Samsung Galaxy S III document viewer code execution
- | [78904] Samsung Galaxy S III USSD denial of service
- | [77811] Samsung Galaxy S2 Epic 4G Touch symlink
- | [76396] AllShare libpin3_dll.dll denial of service
- | [75310] Samsung NET-i viewer ActiveX control buffer overflow
- | [75070] Samsung NET-i ware ActiveX control buffer overflow
- | [75069] Samsung NET-i ware ActiveX control code execution
- | [75066] Samsung NET-i ware Master and Storage denial of service
- | [74928] Multiple Samsung TV and BD products string denial of service
- | [74927] Multiple Samsung TV and BD products controller packet denial of service
- | [71316] Samsung Omnia 7 RapiConfig.exe code execution
- | [67315] Samsung Integrated Management System DMS authentication form SQL Injection
- | [50110] Samsung SMS messages authentication bypass
- | [44995] Samsung DVR SHR2040 Web interface denial of service
- | [35502] Samsung SCX-4200 driver installation script privilege escalation
- | [19927] Samsung default accounts and passwords allow unauthorized access
- | [19925] Samsung ADSL Router information disclosure
- | [15973] Samsung SmartEther allows administrative access
- | [6845] Samsung ML-85G printer driver /tmp symlink
- |
- | Exploit-DB - https://www.exploit-db.com:
- | [19289] Samsung AllShare 2.1.1.0 NULL Pointer Deference
- | [27753] Samsung DVR Firmware 1.10 - Authentication Bypass
- | [27043] Samsung PS50C7700 TV - Denial of Service
- | [22007] Samsung Kies 2.3.2.12054_20 - Multiple Vulnerabilities
- | [21001] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (3)
- | [21000] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (2)
- | [20999] Samsung ml85p Printer Driver 1.0 Insecure Temporary File Creation Vulnerability (1)
- | [19027] Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
- | [18808] SAMSUNG NET-i Viewer 1.37 SEH Overwrite
- | [18765] samsung net-i ware <= 1.37 - Multiple Vulnerabilities
- | [18751] Samsung D6000 TV Multiple Vulnerabilities
- | [6394] Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
- |
- | OpenVAS (Nessus) - http://www.openvas.org:
- | [902935] Samsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
- |
- | SecurityTracker - https://www.securitytracker.com:
- | [1028821] Samsung PS50C7700 TV Web Server Processing Flaw Lets Remote Users Deny Service
- | [1027894] Samsung Phone '/dev/exynos-mem' Lets Local Users Gain Root Privileges
- | [1027819] Samsung Printers Hardcoded Password Lets Remote Users Gain Administrative Access
- | [1027571] Samsung Galaxy Phones Android Dialer Lets Remote Users Deny Service
- | [1026976] Samsung TV Bug in Remote Control Feature Lets Remote Users Deny Service
- | [1025508] Samsung Data Management Server Input Validation Flaw Lets Remote Users Inject SQL Commands
- | [1013615] Samsung ADSL Router Discloses Files to Remote Users and May Grant Root Access Via Common Default Passwords
- | [1009947] Samsung SmartEther Authentication Failure Lets Remote Users Gain Administrative Access
- | [1002019] Samsung ML-85G Printer Driver Allows Local Users to Obtain Root Level Access on the Host
- |
- | OSVDB - http://www.osvdb.org:
- | [83012] Samsung AllShare libpin3_dll.dll Content-Length HTTP Header Parsing NULL Pointer Dereference Remote DoS
- | [95574] Samsung PS50C7700 TV Crafted HTTP GET Request Handling Remote DoS
- | [95437] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Content Injection
- | [95436] Samsung Galaxy S3/S4 sCloudBackupProvider.apk SMS Message Restoration Disclosure
- | [94520] Samsung Galaxy S4 Cloud Backup Function SMS Spoofing Weakness
- | [94223] Samsung Multiple IP Camera URI XSS
- | [91499] Google Android on Samsung Multiple Unspecified Information Disclosure
- | [91498] Google Android on Samsung Multiple Unspecified DoS
- | [91497] Google Android on Samsung Multiple Unspecified Phone Setting Manipulation Issues
- | [91496] Google Android on Samsung Unspecified Phone Action Hijacking Issue
- | [91495] Google Android on Samsung Unspecified Unprivileged Arbitrary SMS Message Sending
- | [91494] Google Android on Samsung Unspecified Privileged Application Installation (Issue 2)
- | [91493] Google Android on Samsung Unspecified Privileged Application Installation (Issue 1)
- | [90918] Samsung TV UE55ES6800 Malformed SOAPACTION Handling Remote Overflow DoS
- | [90581] Samsung Galaxy S3 Emergency Contacts / S-Voice PIN Lock Bypass
- | [89118] Samsung Kies SyncService.dll ActiveX PrepareSync() Method Buffer Overflow
- | [88885] SamsungDive for Android Track My Mobile Function Location API Spoofing Weakness
- | [88882] SamsungDive for Android Track My Mobile Function Security Feature Disclosure Weakness
- | [88467] Samsung Galaxy Multiple Devices /dev/exynos-mem Local Privilege Escalation
- | [88379] Samsung LED 3D TV Unspecified Remote Command Execution
- | [87970] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) /www/apps/KiesAir/jws/ssd.php Malformed Request Remote DoS
- | [87969] Samsung S3 Kies Air (com.samsung.swift.app.kiesair) Crafted Request Remote Session Hijack
- | [87872] Samsung Multiple Printers Hardcoded Admin Credentials
- | [86626] Samsung Galaxy S2 Multiple Application Information Disclosure
- | [86501] Samsung Kies CmdAgent.dll ICommandAgent Interface Multiple Method Remote Privilege Escalation
- | [86500] Samsung Kies Samsung.DeviceService.DCA.DeviceDataParagonATGM.1 ActiveX (DCAPARAGONGM.dll) GetDataTable() Method NULL-Pointer Dereference DoS
- | [86197] Samsung Galaxy S3 Unspecified Local Privilege Escalation
- | [86083] Samsung Galaxy S3 Near Field Communication (NFC) Memory Corruption
- | [84925] Samsung Galaxy S dmesg Buffer Touch Coordinate Application Handling Information Disclosure
- | [81222] Samsung Multiple Product MAC Address Field Parsing Remote Overflow DoS
- | [81221] Samsung Multiple Product Controller Packet String Field Parsing Remote DoS
- | [79398] Samsung DWCD Web Interface Default Password (Femtocell)
- | [77158] Samsung Omnia 7 RapiConfig.exe Traversal Provisioning XML File Execution
- | [72255] Samsung Data Management Server Default Hardcoded root Password
- | [72227] Samsung Data Management Server Unspecified SQL Injection
- | [64369] Samsung PC Studio for Mobile Phones fun_avcodec.dll Malformed AVI File Handling DoS
- | [54692] Samsung M8800 Innov8 / SGH-J750 Multiple Method SMS Provisioning Spoofing
- | [54690] Samsung G3210 Web Interface Default Password
- | [54689] Samsung G3210 rc.conf.tmp Cleartext ISP Password Local Disclosure
- | [54688] Samsung G3210 FTP-Server Default Credentials
- | [47976] Samsung DVR SHR2040 Web Interface Request Handling DoS
- | [45404] SJphone on Samsung SCH-i730 Phone Malformed SIP INVITE Message Remote Overflow DoS
- | [38214] Samsung SCX-4200 Driver Installation Script wrap_setuid_third_party_application Function Local Privilege Escalation
- | [16684] Samsung SmartEther Long Password Forced Authentication
- | [15023] Samsung ADSL Modem Multiple Default Accounts
- | [1898] Samsung ml85p Printer Utility Symlink Local Privilege Escalation
- |_
- 445/tcp closed microsoft-ds
- Device type: WAP
- Running (JUST GUESSING): Linux 2.6.X (89%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.22
- Aggressive OS guesses: Tomato firmware (Linux 2.6.22) (89%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 2 hops
- TRACEROUTE (using port 139/tcp)
- HOP RTT ADDRESS
- 1 208.70 ms 10.252.204.1
- 2 208.70 ms ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- NSE: Script Post-scanning.
- Initiating NSE at 13:58
- Completed NSE at 13:58, 0.00s elapsed
- Initiating NSE at 13:58
- Completed NSE at 13:58, 0.00s elapsed
- ####################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-22 13:58 EDT
- NSE: Loaded 47 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 13:58
- Completed NSE at 13:58, 0.00s elapsed
- Initiating NSE at 13:58
- Completed NSE at 13:58, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 13:58
- Completed Parallel DNS resolution of 1 host. at 13:58, 0.02s elapsed
- Initiating UDP Scan at 13:58
- Scanning ip-160-153-136-3.ip.secureserver.net (160.153.136.3) [15 ports]
- Completed UDP Scan at 13:58, 3.11s elapsed (15 total ports)
- Initiating Service scan at 13:58
- Scanning 13 services on ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Service scan Timing: About 7.69% done; ETC: 14:19 (0:19:24 remaining)
- Completed Service scan at 14:00, 102.59s elapsed (13 services on 1 host)
- Initiating OS detection (try #1) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Retrying OS detection (try #2) against ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Initiating Traceroute at 14:00
- Completed Traceroute at 14:00, 7.53s elapsed
- Initiating Parallel DNS resolution of 1 host. at 14:00
- Completed Parallel DNS resolution of 1 host. at 14:00, 0.00s elapsed
- NSE: Script scanning 160.153.136.3.
- Initiating NSE at 14:00
- Completed NSE at 14:00, 7.20s elapsed
- Initiating NSE at 14:00
- Completed NSE at 14:00, 1.23s elapsed
- Nmap scan report for ip-160-153-136-3.ip.secureserver.net (160.153.136.3)
- Host is up (0.16s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 500/udp open|filtered isakmp
- |_ike-version: ERROR: Script execution failed (use -d to debug)
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 278.23 ms 10.252.204.1
- 2 ... 3
- 4 233.44 ms 10.252.204.1
- 5 244.92 ms 10.252.204.1
- 6 244.91 ms 10.252.204.1
- 7 244.90 ms 10.252.204.1
- 8 244.89 ms 10.252.204.1
- 9 244.86 ms 10.252.204.1
- 10 144.75 ms 10.252.204.1
- 11 ... 18
- 19 110.34 ms 10.252.204.1
- 20 220.14 ms 10.252.204.1
- 21 179.50 ms 10.252.204.1
- 22 ... 27
- 28 130.75 ms 10.252.204.1
- 29 ...
- 30 257.38 ms 10.252.204.1
- NSE: Script Post-scanning.
- Initiating NSE at 14:00
- Completed NSE at 14:00, 0.00s elapsed
- Initiating NSE at 14:00
- Completed NSE at 14:00, 0.00s elapsed
- ####################################################################################################################################
- Hosts
- =====
- address mac name os_name os_flavor os_sp purpose info comments
- ------- --- ---- ------- --------- ----- ------- ---- --------
- 160.153.136.3 ip-160-153-136-3.ip.secureserver.net Linux 2.6.X server
- Services
- ========
- host port proto name state info
- ---- ---- ----- ---- ----- ----
- 160.153.136.3 25 tcp smtp closed
- 160.153.136.3 53 udp domain unknown
- 160.153.136.3 67 udp dhcps unknown
- 160.153.136.3 68 udp dhcpc unknown
- 160.153.136.3 69 udp tftp unknown
- 160.153.136.3 80 tcp http open Samsung AllShare httpd
- 160.153.136.3 88 udp kerberos-sec unknown
- 160.153.136.3 123 udp ntp unknown
- 160.153.136.3 137 udp netbios-ns filtered
- 160.153.136.3 138 udp netbios-dgm filtered
- 160.153.136.3 139 tcp netbios-ssn closed
- 160.153.136.3 139 udp netbios-ssn unknown
- 160.153.136.3 161 udp snmp unknown
- 160.153.136.3 162 udp snmptrap unknown
- 160.153.136.3 389 udp ldap unknown
- 160.153.136.3 443 tcp ssl/http open Samsung AllShare httpd
- 160.153.136.3 445 tcp microsoft-ds closed
- 160.153.136.3 500 udp isakmp unknown
- 160.153.136.3 520 udp route unknown
- 160.153.136.3 2049 udp nfs unknown
- #####################################################################################################################################
- Anonymous JTSEC #OpDomesticTerrorism Full Recon #7
Add Comment
Please, Sign In to add comment