35.220.204.27

Regular View Raw Data
Last Seen: 2024-04-29

GeneralInformation

Hostnames 27.204.220.35.bc.googleusercontent.com
Domains googleusercontent.com 
Cloud Provider Google
Cloud Region asia-east2
Country Hong Kong
City Hong Kong
Organization Google LLC
ISP Google LLC
ASN AS396982

WebTechnologies

JavaScript frameworks
Programming languages
Web frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2021-21285 6.5In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
CVE-2021-21284 6.8In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
CVE-2020-27534 5.3util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call.
CVE-2019-16884 7.5runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
CVE-2019-13509 7.5In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
-1576813820 | 2024-04-22T00:12:37.306778
  
25 / tcp
-2053687298 | 2024-04-28T17:49:38.082711
  
80 / tcp
-1371444028 | 2024-04-28T08:39:41.166958
  
81 / tcp
-1371444028 | 2024-04-01T15:59:44.044894
  
82 / tcp
1561587376 | 2024-04-13T03:20:29.387724
  
2375 / tcp
-1371444028 | 2024-04-04T21:20:57.421715
  
5985 / tcp
212459918 | 2024-04-29T03:44:37.250410
  
5986 / tcp
-2053687298 | 2024-04-23T17:27:13.095852
  
8000 / tcp
35672712 | 2024-04-26T02:21:07.493889
  
8081 / tcp
-1371444028 | 2024-04-03T19:25:27.792397
  
8088 / tcp
-1371444028 | 2024-04-27T18:29:42.279243
  
8090 / tcp
-2053687298 | 2024-04-25T08:12:53.697709
  
8888 / tcp
-1371444028 | 2024-04-26T12:07:21.732141
  
9090 / tcp
35672712 | 2024-04-27T22:51:42.236029
  
10000 / tcp



Contact Us

Shodan ® - All rights reserved