65.0.5.98

Regular View Raw Data
Last Seen: 2024-04-21

GeneralInformation

Hostnames ec2-65-0-5-98.ap-south-1.compute.amazonaws.com
Domains amazonaws.com 
Cloud Provider Amazon
Cloud Region ap-south-1
Cloud Service EC2
Country India
City Mumbai
Organization Amazon Data Services India
ISP Amazon.com, Inc.
ASN AS16509

WebTechnologies

JavaScript frameworks
Programming languages
UI frameworks

SecurityContact

Contact q

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2020-4027 6.5Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.
CVE-2019-3398 9.0Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.
CVE-2019-3396 10.0The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
CVE-2019-3395 7.5The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery.
CVE-2019-3394 4.0There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.
CVE-2019-20406 4.4The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.
CVE-2019-15005 4.0The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
CVE-2018-13389 4.3The attachment resource in Atlassian Confluence before version 6.6.1 allows remote attackers to spoof web content in the Mozilla Firefox Browser through attachments that have a content-type of application/rdf+xml.
CVE-2017-18086 4.3Various resources in Atlassian Confluence Server before version 6.4.2 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the issuesURL parameter.
CVE-2017-18085 4.3The viewdefaultdecorator resource in Atlassian Confluence Server before version 6.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the key parameter.
CVE-2017-18084 3.5The usermacros resource in Atlassian Confluence Server before version 6.3.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the description of a macro.
CVE-2017-18083 3.5The editinword resource in Atlassian Confluence Server before version 6.4.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the contents of an uploaded file.
CVE-2017-16856 4.3The RSS Feed macro in Atlassian Confluence before version 6.5.2 allows remote attackers to inject arbitrary HTML or JavaScript via cross site scripting (XSS) vulnerabilities in various rss properties which were used as links without restriction on their scheme.
CVE-2016-6283 4.3Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.10.6 allows remote attackers to inject arbitrary web script or HTML via the newFileName parameter to pages/doeditattachment.action.
CVE-2016-4317 3.5Atlassian Confluence Server before 5.9.11 has XSS on the viewmyprofile.action page.
CVE-2015-8399 4.0Atlassian Confluence before 5.8.17 allows remote authenticated users to read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action.
CVE-2015-8398 4.3Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.8.17 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to rest/prototype/1/session/check.
-2027312840 | 2024-04-20T16:39:30.669758
  
15 / tcp
139855509 | 2024-04-20T05:05:47.605315
  
129 / udp
-1644726382 | 2024-04-21T02:35:54.949538
  
195 / tcp
-2027312840 | 2024-04-20T15:16:28.063827
  
264 / tcp
-1515649480 | 2024-04-20T06:42:06.506537
  
443 / tcp
-1702755199 | 2024-04-20T21:12:04.081605
  
520 / udp
-856371065 | 2024-04-20T21:37:46.889221
  
548 / tcp
982434853 | 2024-04-20T14:40:23.136945
  
587 / tcp
-369160404 | 2024-04-20T08:59:54.061828
  
666 / tcp
-2027312840 | 2024-04-21T02:15:02.438858
  
995 / tcp
-766336104 | 2024-04-20T15:24:15.729860
  
1080 / tcp
-1251729390 | 2024-04-20T19:02:32.797235
  
1099 / tcp
-1743381957 | 2024-04-20T20:49:52.246431
  
1200 / tcp
139855509 | 2024-04-21T02:48:55.269444
  
1434 / udp
275691009 | 2024-04-20T09:34:11.937901
  
2081 / tcp
-1475725920 | 2024-04-20T15:24:50.946946
  
2222 / tcp
2073015905 | 2024-04-20T17:45:01.389945
  
2455 / tcp
956805313 | 2024-04-20T18:16:18.661231
  
3001 / tcp
390792554 | 2024-04-20T13:50:41.816181
  
3051 / tcp
956805313 | 2024-04-21T01:13:06.530293
  
3054 / tcp
-856371065 | 2024-04-21T02:47:17.250871
  
3129 / tcp
-1702755199 | 2024-04-20T10:38:28.002424
  
3283 / udp
-2098738609 | 2024-04-21T03:49:07.821959
  
4282 / tcp
384821124 | 2024-04-21T02:07:31.652495
  
4321 / tcp
1034188527 | 2024-04-20T17:49:35.270173
  
4506 / tcp
-856371065 | 2024-04-20T10:07:18.694697
  
4523 / tcp
-726790289 | 2024-04-20T23:11:45.849937
  
5432 / tcp
-2093536681 | 2024-04-20T19:59:48.233922
  
5435 / tcp
-1564954684 | 2024-04-20T16:49:35.094396
  
6000 / tcp
-2109705848 | 2024-04-20T22:27:39.368575
  
6002 / tcp
-2027312840 | 2024-04-20T18:52:55.951483
  
6443 / tcp
-766336104 | 2024-04-20T22:15:32.510163
  
7776 / tcp
-766336104 | 2024-04-21T02:39:18.990104
  
8021 / tcp
-2027312840 | 2024-04-20T20:20:16.111042
  
8023 / tcp
2073015905 | 2024-04-20T10:46:18.237218
  
8080 / tcp
-369160404 | 2024-04-20T20:41:01.043534
  
8081 / tcp
-1989897184 | 2024-04-20T05:28:27.127167
  
8087 / tcp
-856371065 | 2024-04-20T11:33:34.290211
  
8099 / tcp
-2027312840 | 2024-04-20T11:44:00.727746
  
8123 / tcp
384821124 | 2024-04-20T17:02:35.766550
  
8333 / tcp
-369160404 | 2024-04-21T01:16:23.679541
  
8419 / tcp
-766336104 | 2024-04-20T14:28:03.790861
  
8421 / tcp
1986097200 | 2024-04-21T02:52:40.687224
  
8500 / tcp
-1989897184 | 2024-04-20T05:42:09.945001
  
8787 / tcp
-856371065 | 2024-04-21T03:39:54.148103
  
9002 / tcp
42589795 | 2024-04-20T10:26:36.692997
  
9042 / tcp
-856371065 | 2024-04-20T16:08:38.444782
  
9090 / tcp
1190220700 | 2024-04-20T12:06:26.149500
  
9682 / tcp
-369160404 | 2024-04-20T18:59:11.472263
  
9869 / tcp
-878923528 | 2024-04-20T18:29:39.279202
  
9876 / tcp
-306018029 | 2024-04-21T01:46:53.208007
  
10134 / tcp
-369160404 | 2024-04-20T22:11:05.169531
  
10554 / tcp
-1904188141 | 2024-04-20T08:33:40.049001
  
11112 / tcp
-2027312840 | 2024-04-20T21:38:53.694958
  
51106 / tcp



Contact Us

Shodan ® - All rights reserved