49.48.200.156

Regular View Raw Data
Last Seen: 2024-04-24

GeneralInformation

Hostnames mx-ll-49.48.200-156.dynamic.3bb.co.th
mx-ll-49.48.200-156.dynamic.3bb.in.th
Domains 3bb.co.th 3bb.in.th 
Country Thailand
City Khlong Khlung
Organization Triple T Broadband Public Company Limited
ISP JasTel Network International Gateway
ASN AS45629

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2019-11072 7.5lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states "The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e.g. lighttpd.conf). Certain input will trigger an abort() in lighttpd when that feature is enabled. lighttpd detects the underflow or realloc() will fail (in both 32-bit and 64-bit executables), also detected in lighttpd. Either triggers an explicit abort() by lighttpd. This is not exploitable beyond triggering the explicit abort() with subsequent application exit.
CVE-2018-19052 5.0An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
CVE-2015-3200 5.0mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
CVE-2014-2324 5.0Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.
CVE-2014-2323 7.5SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.
CVE-2013-4560 5.0Use-after-free vulnerability in lighttpd before 1.4.33 allows remote attackers to cause a denial of service (segmentation fault and crash) via unspecified vectors that trigger FAMMonitorDirectory failures.
CVE-2013-4559 7.6lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.
CVE-2013-4508 4.3lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
CVE-2013-1427 1.9The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.
CVE-2011-4362 5.0Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index.
1848766380 | 2024-04-19T07:03:38.530659
  
11 / tcp
1848766380 | 2024-04-23T11:38:35.507523
  
15 / tcp
1848766380 | 2024-04-21T23:52:20.549536
  
17 / tcp
1848766380 | 2024-04-22T04:26:15.323834
  
21 / tcp
1848766380 | 2024-04-19T03:54:53.895697
  
25 / tcp
1848766380 | 2024-04-22T12:11:13.015096
  
43 / tcp
1848766380 | 2024-04-22T14:43:07.642883
  
49 / tcp
1848766380 | 2024-04-22T17:52:52.554778
  
53 / tcp
1848766380 | 2024-04-19T22:40:48.998713
  
79 / tcp
1848766380 | 2024-04-22T22:38:49.010317
  
81 / tcp
1848766380 | 2024-04-23T14:46:40.690596
  
84 / tcp
1848766380 | 2024-04-24T12:43:28.505848
  
85 / tcp
1848766380 | 2024-04-22T11:23:07.823115
  
88 / tcp
1848766380 | 2024-04-18T23:11:50.097714
  
102 / tcp
1848766380 | 2024-04-20T18:10:49.832598
  
104 / tcp
1848766380 | 2024-04-18T09:02:01.502955
  
110 / tcp
1848766380 | 2024-04-23T06:37:59.248108
  
111 / tcp
1848766380 | 2024-04-23T15:24:24.226782
  
113 / tcp
1848766380 | 2024-04-18T05:51:03.702314
  
119 / tcp
1848766380 | 2024-04-22T23:38:25.811284
  
143 / tcp
1848766380 | 2024-04-18T21:27:51.835913
  
175 / tcp
1848766380 | 2024-04-21T11:48:30.971445
  
179 / tcp
1848766380 | 2024-04-20T22:40:00.529237
  
195 / tcp
1848766380 | 2024-04-23T20:35:46.172634
  
264 / tcp
607838760 | 2024-04-24T16:33:21.710418
  
311 / tcp
1848766380 | 2024-04-22T09:56:30.583416
  
427 / tcp
1848766380 | 2024-04-20T02:13:12.251332
  
444 / tcp
1848766380 | 2024-04-24T07:38:10.508898
  
465 / tcp
1848766380 | 2024-04-19T03:34:26.308613
  
502 / tcp
1848766380 | 2024-04-24T15:23:02.768875
  
503 / tcp
1848766380 | 2024-04-20T04:24:37.568012
  
515 / tcp
1848766380 | 2024-04-22T23:00:27.204681
  
541 / tcp
1105331714 | 2024-04-23T00:38:47.616697
  
554 / tcp
1848766380 | 2024-04-22T00:43:28.424765
  
587 / tcp
1848766380 | 2024-04-20T22:45:12.345329
  
631 / tcp
1848766380 | 2024-04-21T16:53:55.694221
  
636 / tcp
1848766380 | 2024-04-18T06:36:54.543940
  
675 / tcp
1848766380 | 2024-04-20T09:28:48.006693
  
902 / tcp
1848766380 | 2024-04-22T00:30:38.105875
  
993 / tcp
1848766380 | 2024-04-19T14:05:45.372398
  
995 / tcp
1848766380 | 2024-04-24T16:36:47.887195
  
1023 / tcp
1848766380 | 2024-04-22T15:13:52.718971
  
1025 / tcp
1848766380 | 2024-04-21T17:21:53.355806
  
1153 / tcp
1848766380 | 2024-04-23T03:38:58.664399
  
1311 / tcp
1848766380 | 2024-04-23T15:00:41.023495
  
1400 / tcp
1848766380 | 2024-04-19T15:07:42.328773
  
1599 / tcp
1848766380 | 2024-04-21T01:52:33.829032
  
1604 / tcp
1848766380 | 2024-04-21T11:27:52.900289
  
1660 / tcp
1848766380 | 2024-04-18T16:13:47.703911
  
1911 / tcp
1848766380 | 2024-04-23T17:12:19.665014
  
1925 / tcp
-1894803734 | 2024-04-22T03:50:23.755171
  
1926 / tcp
1848766380 | 2024-04-21T01:28:59.356643
  
1935 / tcp
1848766380 | 2024-04-23T21:40:32.635550
  
1962 / tcp
1848766380 | 2024-04-24T15:26:56.739727
  
2000 / tcp
1848766380 | 2024-04-19T18:23:25.252794
  
2008 / tcp
1848766380 | 2024-04-20T08:47:54.072563
  
2081 / tcp
1848766380 | 2024-04-21T12:55:03.602289
  
2082 / tcp
814685346 | 2024-04-22T04:25:52.798326
  
2083 / tcp
-479095588 | 2024-04-21T12:20:03.320545
  
2087 / tcp
1848766380 | 2024-04-23T23:45:18.276381
  
2181 / tcp
1848766380 | 2024-04-18T07:27:13.474301
  
2200 / tcp
1848766380 | 2024-04-19T08:17:18.514889
  
2211 / tcp
1848766380 | 2024-04-23T21:35:39.043739
  
2222 / tcp
1848766380 | 2024-04-23T11:21:25.045422
  
2375 / tcp
515371782 | 2024-04-18T11:18:41.117837
  
2376 / tcp
1848766380 | 2024-04-21T21:03:39.110341
  
2506 / tcp
1848766380 | 2024-04-21T13:43:07.463850
  
2761 / tcp
1848766380 | 2024-04-22T15:45:02.657622
  
2762 / tcp
1848766380 | 2024-04-22T09:57:37.996121
  
3050 / tcp
1848766380 | 2024-04-18T02:08:34.227454
  
3067 / tcp
1848766380 | 2024-04-23T22:38:02.194045
  
3099 / tcp
1848766380 | 2024-04-24T11:45:19.894421
  
3128 / tcp
1848766380 | 2024-04-21T12:16:12.192114
  
3221 / tcp
1848766380 | 2024-04-24T01:28:08.230219
  
3268 / tcp
1848766380 | 2024-04-23T00:37:47.597324
  
3310 / tcp
1848766380 | 2024-04-24T17:00:13.044144
  
3333 / tcp
1848766380 | 2024-04-24T20:24:30.298763
  
3388 / tcp
1848766380 | 2024-04-19T16:02:33.029740
  
3403 / tcp
1848766380 | 2024-04-22T05:02:17.993922
  
3410 / tcp
1848766380 | 2024-04-20T22:51:08.305081
  
3548 / tcp
1848766380 | 2024-04-23T23:45:52.370794
  
3551 / tcp
1848766380 | 2024-04-24T04:55:22.754870
  
3690 / tcp
1848766380 | 2024-04-21T09:15:59.868699
  
3749 / tcp
-1935601219 | 2024-04-19T03:36:34.972979
  
3780 / tcp
2103416603 | 2024-04-21T15:56:08.239365
  
3790 / tcp
1848766380 | 2024-04-22T20:22:15.721474
  
3794 / tcp
1848766380 | 2024-04-22T18:10:57.886352
  
4000 / tcp
1848766380 | 2024-04-21T20:35:07.776785
  
4064 / tcp
1848766380 | 2024-04-23T23:24:36.853944
  
4242 / tcp
1848766380 | 2024-04-22T03:56:49.540518
  
4282 / tcp
1848766380 | 2024-04-18T16:08:20.867562
  
4369 / tcp
-989275571 | 2024-04-17T19:52:22.661854
  
4443 / tcp
1848766380 | 2024-04-23T08:11:24.719200
  
4500 / tcp
1848766380 | 2024-04-24T06:51:10.540506
  
4506 / tcp
1848766380 | 2024-04-24T19:10:24.843899
  
4567 / tcp
1848766380 | 2024-04-19T15:08:43.707182
  
4664 / tcp
1848766380 | 2024-04-21T02:56:56.651191
  
4782 / tcp
1848766380 | 2024-04-24T19:18:23.564046
  
4848 / tcp
1848766380 | 2024-04-19T06:56:01.665704
  
4899 / tcp
1848766380 | 2024-04-19T08:32:27.331640
  
4911 / tcp
-388941994 | 2024-04-23T19:57:46.419584
  
5001 / tcp
1848766380 | 2024-04-21T12:14:56.804248
  
5003 / tcp
1900181372 | 2024-04-21T13:13:52.900301
  
5006 / tcp
1848766380 | 2024-04-24T13:45:43.691937
  
5009 / tcp
1848766380 | 2024-04-24T09:41:57.399421
  
5010 / tcp
542696720 | 2024-04-24T05:38:55.588628
  
5172 / tcp
1848766380 | 2024-04-21T17:29:38.641711
  
5222 / tcp
1848766380 | 2024-04-24T01:36:50.668409
  
5269 / tcp
1848766380 | 2024-04-18T06:05:44.268795
  
5321 / tcp
1848766380 | 2024-04-19T10:27:22.847502
  
5357 / tcp
1848766380 | 2024-04-23T21:19:31.310142
  
5432 / tcp
1848766380 | 2024-04-20T15:39:17.230459
  
5560 / tcp
1848766380 | 2024-04-19T09:20:08.081099
  
5606 / tcp
1848766380 | 2024-04-20T06:06:27.772207
  
5800 / tcp
1848766380 | 2024-04-20T04:15:25.128732
  
5801 / tcp
1848766380 | 2024-04-20T05:48:03.285840
  
5858 / tcp
1848766380 | 2024-04-23T10:55:30.746869
  
5900 / tcp
1848766380 | 2024-04-24T20:48:27.194795
  
5901 / tcp
1848766380 | 2024-04-20T01:18:08.602463
  
5907 / tcp
1848766380 | 2024-04-24T06:41:32.461783
  
5910 / tcp
1848766380 | 2024-04-20T07:40:26.218833
  
5938 / tcp
-872711814 | 2024-04-23T09:49:08.762934
  
5984 / tcp
881406552 | 2024-04-22T05:53:39.016756
  
5986 / tcp
1848766380 | 2024-04-19T12:59:38.516766
  
6002 / tcp
1848766380 | 2024-04-21T21:29:26.386205
  
6007 / tcp
1848766380 | 2024-04-18T05:11:18.096975
  
6010 / tcp
1848766380 | 2024-04-23T10:41:25.982386
  
6080 / tcp
1848766380 | 2024-04-24T00:59:29.411739
  
6262 / tcp
1848766380 | 2024-04-22T18:46:54.364137
  
6264 / tcp
1982509949 | 2024-04-17T19:16:25.297975
  
6443 / tcp
1848766380 | 2024-04-21T10:08:20.967219
  
6633 / tcp
1848766380 | 2024-04-23T11:50:59.999790
  
6653 / tcp
1848766380 | 2024-04-23T11:30:30.003350
  
6664 / tcp
1848766380 | 2024-04-20T06:17:09.690743
  
6666 / tcp
1848766380 | 2024-04-20T17:31:58.879501
  
6667 / tcp
1848766380 | 2024-04-22T21:31:38.591300
  
6668 / tcp
1848766380 | 2024-04-18T16:02:50.380549
  
7002 / tcp
1848766380 | 2024-04-17T23:08:03.289444
  
7014 / tcp
1848766380 | 2024-04-23T03:45:23.468756
  
7171 / tcp
-1904883992 | 2024-04-24T14:52:05.781735
  
7434 / tcp
-1875125056 | 2024-04-23T15:14:26.329604
  
7548 / tcp
1848766380 | 2024-04-24T09:04:15.744348
  
7634 / tcp
1848766380 | 2024-04-19T00:45:42.724640
  
7657 / tcp
1848766380 | 2024-04-23T01:21:45.878778
  
7777 / tcp
1848766380 | 2024-04-18T13:34:18.216077
  
7989 / tcp
1848766380 | 2024-04-21T13:40:30.385495
  
8000 / tcp
1848766380 | 2024-04-23T19:45:28.421493
  
8001 / tcp
1848766380 | 2024-04-19T03:39:23.050202
  
8008 / tcp
1848766380 | 2024-04-20T23:17:34.068227
  
8009 / tcp
1848766380 | 2024-04-23T02:44:34.994237
  
8010 / tcp
1848766380 | 2024-04-22T02:54:46.647667
  
8031 / tcp
1848766380 | 2024-04-22T18:35:51.550481
  
8047 / tcp
1848766380 | 2024-04-23T14:07:02.811497
  
8049 / tcp
1848766380 | 2024-04-18T07:19:16.676831
  
8058 / tcp
1848766380 | 2024-04-22T03:31:51.029094
  
8060 / tcp
1848766380 | 2024-04-24T15:20:04.577621
  
8069 / tcp
1848766380 | 2024-04-22T17:20:32.785277
  
8080 / tcp
-1186972066 | 2024-04-24T12:03:58.880395
  
8085 / tcp
1848766380 | 2024-04-22T10:10:43.167010
  
8086 / tcp
2003455996 | 2024-04-20T13:50:34.622928
  
8089 / tcp
1848766380 | 2024-04-18T19:04:27.894228
  
8093 / tcp
1848766380 | 2024-04-22T00:18:51.296898
  
8098 / tcp
1848766380 | 2024-04-24T06:45:13.117957
  
8099 / tcp
1848766380 | 2024-04-20T11:19:34.626622
  
8105 / tcp
1848766380 | 2024-04-19T13:48:29.820636
  
8109 / tcp
1848766380 | 2024-04-24T17:00:18.430791
  
8110 / tcp
1848766380 | 2024-04-23T21:15:23.333127
  
8112 / tcp
1848766380 | 2024-04-22T19:01:02.714400
  
8123 / tcp
340108515 | 2024-04-24T13:54:52.874112
  
8139 / tcp
-1163983815 | 2024-04-19T03:32:31.463603
  
8140 / tcp
-1397787824 | 2024-04-21T11:38:48.004932
  
8181 / tcp
1848766380 | 2024-04-24T15:01:29.186387
  
8333 / tcp
1848766380 | 2024-04-23T07:21:57.390813
  
8409 / tcp
1848766380 | 2024-04-19T11:49:12.995541
  
8412 / tcp
1848766380 | 2024-04-18T14:59:37.403411
  
8423 / tcp
-665383741 | 2024-04-21T01:55:40.380662
  
8443 / tcp
1848766380 | 2024-04-21T03:11:54.345729
  
8575 / tcp
1848766380 | 2024-04-19T09:30:03.769937
  
8649 / tcp
1848766380 | 2024-04-19T12:20:20.470169
  
8728 / tcp
1848766380 | 2024-04-24T18:50:03.320211
  
8802 / tcp
1848766380 | 2024-04-24T00:33:40.536170
  
8806 / tcp
1848766380 | 2024-04-17T23:34:18.006803
  
8821 / tcp
1848766380 | 2024-04-18T13:54:54.568468
  
8823 / tcp
-1951156081 | 2024-04-22T11:55:47.941837
  
8834 / tcp
1848766380 | 2024-04-24T15:36:31.786565
  
8869 / tcp
965005053 | 2024-04-24T17:12:34.357244
  
8880 / tcp
1848766380 | 2024-04-22T02:30:24.961135
  
8888 / tcp
-1856236940 | 2024-04-18T20:31:20.283202
  
8889 / tcp
1848766380 | 2024-04-18T18:00:38.580147
  
8989 / tcp
1848766380 | 2024-04-24T18:38:47.996287
  
9000 / tcp
-575545595 | 2024-04-21T00:17:40.090618
  
9001 / tcp
1848766380 | 2024-04-18T07:31:19.269621
  
9005 / tcp
1848766380 | 2024-04-24T08:13:10.029162
  
9018 / tcp
1848766380 | 2024-04-24T13:11:46.219137
  
9032 / tcp
1848766380 | 2024-04-19T03:05:02.368713
  
9038 / tcp
1848766380 | 2024-04-18T17:58:14.332549
  
9039 / tcp
1848766380 | 2024-04-18T22:22:43.187630
  
9045 / tcp
1848766380 | 2024-04-20T01:04:38.142672
  
9051 / tcp
1848766380 | 2024-04-22T21:09:14.794486
  
9080 / tcp
1848766380 | 2024-04-23T11:33:34.418253
  
9090 / tcp
1848766380 | 2024-04-23T07:15:26.210661
  
9093 / tcp
-267358252 | 2024-04-24T02:30:23.814616
  
9095 / tcp
1848766380 | 2024-04-24T18:50:58.556883
  
9099 / tcp
1848766380 | 2024-04-17T20:29:01.754268
  
9107 / tcp
1848766380 | 2024-04-19T10:33:52.829381
  
9109 / tcp
1848766380 | 2024-04-24T03:45:55.192883
  
9191 / tcp
1848766380 | 2024-04-24T06:58:55.338562
  
9200 / tcp
1848766380 | 2024-04-18T20:28:45.985010
  
9418 / tcp
1848766380 | 2024-04-19T12:05:51.254169
  
9530 / tcp
1848766380 | 2024-04-24T20:34:46.974860
  
9595 / tcp
1848766380 | 2024-04-23T15:45:47.820991
  
9761 / tcp
1848766380 | 2024-04-23T07:46:46.689416
  
9800 / tcp
1848766380 | 2024-04-23T20:55:31.651917
  
9869 / tcp
-66925500 | 2024-04-22T01:03:32.957678
  
9943 / tcp
1848766380 | 2024-04-19T02:07:52.609822
  
9944 / tcp
1848766380 | 2024-04-18T01:56:53.896563
  
9991 / tcp
1848766380 | 2024-04-23T15:00:53.252939
  
9998 / tcp
1848766380 | 2024-04-18T05:51:15.056328
  
9999 / tcp
-771382008 | 2024-04-24T07:21:11.340190
  
10000 / tcp
1848766380 | 2024-04-23T01:42:31.878650
  
10243 / tcp
630626511 | 2024-04-17T23:37:01.299091
  
10250 / tcp
1848766380 | 2024-04-22T20:10:26.600241
  
10911 / tcp
1848766380 | 2024-04-18T13:18:52.546737
  
11000 / tcp
1848766380 | 2024-04-21T23:40:09.701644
  
11112 / tcp
1848766380 | 2024-04-19T06:48:18.398564
  
11210 / tcp
1848766380 | 2024-04-19T17:51:14.692209
  
11371 / tcp
1848766380 | 2024-04-22T04:51:10.635233
  
11434 / tcp
1848766380 | 2024-04-18T05:39:21.575675
  
16010 / tcp
1848766380 | 2024-04-20T18:15:00.253338
  
16992 / tcp
1848766380 | 2024-04-22T16:01:38.912087
  
19000 / tcp
1848766380 | 2024-04-23T03:17:40.494205
  
19071 / tcp
1848766380 | 2024-04-21T22:15:11.965575
  
20256 / tcp
1848766380 | 2024-04-21T00:06:36.144528
  
21025 / tcp
1848766380 | 2024-04-24T09:06:15.048119
  
21379 / tcp
1848766380 | 2024-04-24T05:31:54.035707
  
23424 / tcp
1848766380 | 2024-04-20T19:38:41.466781
  
25001 / tcp
1848766380 | 2024-04-22T05:24:11.818289
  
25105 / tcp
1848766380 | 2024-04-22T21:12:08.704139
  
28107 / tcp
1848766380 | 2024-04-19T20:48:02.585074
  
30003 / tcp
1848766380 | 2024-04-21T22:26:44.730052
  
32764 / tcp
1848766380 | 2024-04-23T20:05:07.528623
  
37215 / tcp
1848766380 | 2024-04-19T20:37:32.966950
  
37777 / tcp
1848766380 | 2024-04-22T22:30:26.202678
  
41800 / tcp
1848766380 | 2024-04-24T01:10:42.094779
  
44158 / tcp
1848766380 | 2024-04-21T06:43:11.692595
  
44818 / tcp
1848766380 | 2024-04-19T10:49:38.762129
  
50000 / tcp
1848766380 | 2024-04-24T12:01:45.614158
  
50050 / tcp
1848766380 | 2024-04-24T04:45:12.945005
  
50100 / tcp
1848766380 | 2024-04-23T09:35:43.352003
  
51235 / tcp
1848766380 | 2024-04-24T13:52:17.214766
  
60001 / tcp



Contact Us

Shodan ® - All rights reserved