• XSS.stack #1 – первый литературный журнал от юзеров форума

CSV [FOFA.so] Microsoft Outlook Exchange

marmalade

Gray Hat ♣ White Rabbit
Пользователь
Регистрация
29.07.2021
Сообщения
691
Реакции
723
Гарант сделки
10
Депозит
0.1 и др.
Как и обещал, продаюсь за лайки как последняя камвхора.

Забудьте про это:
Screenshot_2021-09-09_04-38-35.png

Там не полная база. Но чтобы такого не было, я немного усложняю задачу. Думаю будет меньше желания раскидываться.

Это прошлая. Расскажи про эту базу
А эта, компоновалась по следующей логике. Была сделана сверка с прошлой базой из Shodan и обнаружена разница в 300к+ хостов, которые тут и выкладываю. Так понятней преимущество Fofa. Наглядно.
Но ты же показывал там почти лям был
Для пытливых умов - дорк /owa содержит мусор, попадается даже Wordpress, поэтому пришлось чистить
С тяп-ляп подходом - базу можно гонять по много раз и каждый раз находить что-то новое. Но надо включать ручки иначе никак. А потом ножки. Ха-Ха

Ну и что, не хитрое дело
Ну, парсить шодан уже некоторые и сами могут, не хитро, в самом деле, поэтому и продаю ключи, не надо от меня и моего парса зависить, я за любые коллаборации. Но это база с Фофы и ее особенность я пояснил. И это не все. Как я чекаю IP2Revenue? Полу-ручной парсинг. В каждую строчку вложен труд и усилия, просмотреть ИП, Хуис, Домены в разных местах, не перепутать с ISP, хостером, партнером, сверить сайт и название, регион и т.п.

http://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/attachments/26990/http://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/attachments/26991/http://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/attachments/26992/

Ну вы только посмотрите...
Банки в Панаме. С дыркой в аутлуке. С местными (чингачгуки) админами. Офшорный финанс. Обновляют софт по календарю майя. Вот здесь и нужны глазки, какой еще многопоточный чекер? Это не то.

Классно, давай по офшорам!
Но это сервера в Панаме. Айпи. Не всегда именно контора. Нужны конторы в Мавритании, Гибралтаре, ГК, BVI. Глазками перепроверяем и находим.
Или по категории, айтишки и софтвар? Аналогично но дополнительным парсером прогоняем.
База для ознакомления! Нужно нанимать целый штат чтобы было красиво. На данный момент так, но уже видно к чему можно стремиться. Открыт к любым предложениям.

А пока, есть два стула, два варианта:

Для умных:


Для деловых:
Платный контент.
GIMMEBASE - пароль в ПМ Эта штука оплаты вообще рабочая?


Благодарю National Hazard Agency за идею

Пошумим?
notpatched.png


Ну что, может выложить базу Zoominfo? Вы знаете что делать.
Давайте сделаем 100 и я точно что-то интересное выложу.

UPD: пост будет обновлятся еще в течении дня
 

Вложения

  • corp-osint-sample.png
    corp-osint-sample.png
    38.4 КБ · Просмотры: 787
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
Ну, парсить шодан уже некоторые и сами могут, не хитро, в самом деле, поэтому и продаю ключи,
Как парсить шодан если там в бесплатной версии только две страницы выдачи?
Я думал что от бесплатного шодановского акка толку 0.
 
Последнее редактирование:
Как парсить шодан если там в бесплатной версии только две страницы выдачи?
Я думал что безплатного акка от шодана толку 0.
Вообще можно исхитриться, поэтому я и выкладывал пачку простых ключей к шодану на форуме бесплатно. Но это извращение, согласен. Shodan ключ стоит своих денег, хоть официально покупать его, но дешевле у меня.
 
ip full port Domains Product Hostnames ISP Server Common Names Organization Country code Country name City Vulns ZI Company ZI Headquaters ZI Revenue ZI Employees ZI Website ZI Industries ZI Link emails phones email provider SPF domains, ips Supply Chain G tags connected websites Endpoints from frontend
213.181.118.209 yes 443 "[""hve.is""]" Microsoft IIS httpd "[""postur.hve.is""]" Nova hf Microsoft-IIS/8.5 *.hve.is Heilbrigðisstofnun Vesturlands IS Iceland Reykjavík "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Nova Lágmúli 9, Reykjavik, Capital Region, Iceland $15 Million 75 www.nova.is Telephony & Wireless, Telecommunications https://www.zoominfo.com/c/nova/430105259 gunnar@nova.is +354 519 1000
212.30.252.87 yes 443 "[""skrin.is""]" Microsoft IIS httpd "[""87.252.ptr.skrin.is""]" Advania Island ehf Microsoft-IIS/8.5 postur.stapi.is IS Iceland Akureyri "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Hringdu Grensasvegur 22, Reykjavík -, 108, Iceland $5 Million 25 www.hringdu.is Telephony & Wireless, Telecommunications https://www.zoominfo.com/c/hringdu/372522810 +354 537 7000
200.46.135.88 yes 443 [] Microsoft IIS httpd [] Cable Onda Microsoft-IIS/10.0 movil.etesa.com.pa PA Panama Coclé "{""CVE-2021-34473"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Etesa Plz Sun TowerAvenue Ricardo J. AlfaroEl DoradoThird Fl, Panama, Panama, Panama $7 Million 30 www.etesa.com.pa Electricity, Oil & Gas Energy, Utilities & Waste Treatment https://www.zoominfo.com/c/etesa/425367993
200.46.238.114 yes 443 "[""fpbbank.com""]" Microsoft IIS httpd "[""Smtp2.fpbbank.com""]" Cable Onda Microsoft-IIS/8.0 webmail.fpbbank.com FPB Bank Inc. S.A. PA Panama Colón "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" FPB Bank $5 Million 30 www.fpbbank.com Banking, Finance https://www.zoominfo.com/c/fpb-bank-inc/
190.61.82.140 yes 443 "[""ingenieriarm.com""]" Microsoft IIS httpd "[""mail.ingenieriarm.com""]" UFINET PANAMA S.A. Microsoft-IIS/8.5 mail.ingenieriarm.com PA Panama Panamá "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Ingeniería R-M San Francisco, Avenida Matilde Obarrio De Mallet No. 104, Panama, Panama, Panama $5 Million <25 www.ingenieriarm.com Architecture, Engineering & Design Construction https://www.zoominfo.com/c/ingenieria-r--m-sa/425706730
190.205.61.117 yes 443 "[""universaldeseguros.com""]" Microsoft IIS httpd "[""mail2.universaldeseguros.com""]" CANTV Servicios, Venezuela Microsoft-IIS/8.0 univserver VE Venezuela, Bolivarian Republic of Caracas "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-26858"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-26857"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-26855"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-27065"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""}}" Universal de Seguros C.A Ave Avila c/ Ave Libertador Torre Xerox piso 10 Of. 10-B. Bello Campo., Caracas, Capital, $89 Million 356 www.universaldeseguros.com Insurance https://www.zoominfo.com/c/universal-de-seguros/359397569 anabelg@segurosca.com
190.205.124.135 yes 443 "[""cantv.net""]" Microsoft IIS httpd "[""190-205-124-135.dyn.dsl.cantv.net""]" CANTV Servicios, Venezuela Microsoft-IIS/10.0 Correo.Restoven.com Restoven de Venezuela C.A VE Venezuela, Bolivarian Republic of Caracas "{""CVE-2021-34473"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Restoven de Venezuela C.A El Recreo, Caracas, Capital, Venezuela $500 Million 2550 restoven.com Restaurants, Hospitality https://www.zoominfo.com/c/restoven-de-venezuela-ca/430288794
200.46.33.136 yes 443 "[""glp.com.pa"",""federalmall.com.pa"",""spaceplayworld.com"",""tropicalhome.com.pa"",""grupolospueblos.com"",""oceanreefmarina.com.pa""]" Microsoft IIS httpd "[""mail.glp.com.pa"",""autodiscover.glp.com.pa"",""mail.federalmall.com.pa"",""mail.spaceplayworld.com"",""mail.tropicalhome.com.pa"",""mail.grupolospueblos.com"",""mail.oceanreefmarina.com.pa""]" Cable Onda Microsoft-IIS/8.5 mail.grupolospueblos.com PA Panama Panama City "{""CVE-2021-34473"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Grupo Los Pueblos $8 Million 36 www.glp.com.pa Real Estate https://www.zoominfo.com/c/grupo-los-pueblos/348674918 cads@grupolospueblos.com
201.218.247.90 yes 443 "[""capitalbank.com.pa""]" Microsoft IIS httpd "[""mail.capitalbank.com.pa""]" Cable Onda Microsoft-IIS/8.5 mail.capitalbank.com.pa PA Panama Panama City "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Capital Bank P H Global Plz Bldg Lobby Level, Panama, Panama, Panama $27 Million 136 www.capitalbank.com.pa Banking, Finance https://www.zoominfo.com/c/capital-bank-inc/372138618
200.46.253.34 yes 443 "[""talial.com""]" Microsoft IIS httpd "[""correo.talial.com""]" Cable Onda Microsoft-IIS/8.5 correo.talial.com TALIAL PA Panama Colón "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Tapia , Linares & Alfaro Paseo Roberto Motta, Panama, Panama, Panama <$5 Million <25 www.talial.com Law Firms & Legal Services alinares@talial.com
45.225.70.14 yes 443 [] Microsoft IIS httpd [] Trans Ocean Network Microsoft-IIS/7.5 mail2.atlasbank.com PA Panama Panamá "{""CVE-2021-34473"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2010-1899"":{""verified"":false,""references"":[""https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-065""],""cvss"":""4.3"",""summary"":""Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka \""IIS Repeated Parameter Request Denial of Service Vulnerability.\""""},""CVE-2021-26858"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2010-2730"":{""verified"":false,""references"":[""https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-065""],""cvss"":""9.3"",""summary"":""Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka \""Request Header Buffer Overflow Vulnerability.\""""},""CVE-2021-26857"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-26855"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-27065"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31207"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""},""CVE-2021-31206"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2010-3972"":{""verified"":false,""references"":[""http://blogs.technet.com/b/srd/arch...sues-currently-being-tracked-by-the-msrc.aspx"",""http://www.exploit-db.com/exploits/15803"",""http://www.kb.cert.org/vuls/id/842372"",""http://www.securityfocus.com/bid/45542"",""http://www.securitytracker.com/id?1024921"",""http://www.vupen.com/english/advisories/2010/3305"",""https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-004"",""https://exchange.xforce.ibmcloud.com/vulnerabilities/64248""],""cvss"":""10.0"",""summary"":""Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka \""IIS FTP Service Heap Buffer Overrun Vulnerability.\"" NOTE: some of these details are obtained from third party information.""},""CVE-2012-2531"":{""verified"":false,""references"":[""http://www.securityfocus.com/bid/56439"",""https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-073""],""cvss"":""2.1"",""summary"":""Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, which allows local users to discover credentials by reading this file, aka \""Password Disclosure Vulnerability.\""""},""CVE-2021-34523"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2010-1256"":{""verified"":false,""references"":[""http://www.securityfocus.com/bid/40573"",""http://www.us-cert.gov/cas/techalerts/TA10-159B.html"",""https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-040"",""https://exchange.xforce.ibmcloud.com/vulnerabilities/58864""],""cvss"":""8.5"",""summary"":""Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to \""token checking\"" that trigger memory corruption, aka \""IIS Authentication Memory Corruption Vulnerability.\""""},""CVE-2012-2532"":{""verified"":false,""references"":[""http://www.securityfocus.com/bid/56440"",""https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-073""],""cvss"":""5.0"",""summary"":""Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka \""FTP Command Injection Vulnerability.\""""}}" Atlas Bank 689 5th Ave, Brooklyn, New York, 11215, United States $5 Million <25 www.atlasbank.com Banking, Finance https://www.zoominfo.com/c/atlas-bank-sa/16077755
186.5.136.187 yes 443 [] [] Columbus Networks Panama nginx *.migracion.gob.pa PA Panama Panama City "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Direccion Nacional de Migracion Panama $50 Million 266 www.migracion.gob.pa Public Safety, Cities, Towns & Municipalities https://www.zoominfo.com/c/direccion-nacional-de-migracion/459802015
186.74.177.164 yes 443 [] Microsoft IIS httpd [] Cable & Wireless Panama Microsoft-IIS/8.5 owa.sc.suninternational.com Sun International PA Panama Panama City "{""CVE-2021-34473"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-26858"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-26857"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-26855"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31207"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""},""CVE-2021-31206"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":false,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-27065"":{""verified"":true,""references"":[""http://aka.ms/exchangevulns""],""cvss"":7.8,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""}}" Sun International 209 Aramist Ave, Pretoria, Gauteng, South Africa $1 Billion 14632 www.suninternational.com Lodging & Resorts, Hospitality, Recreation https://www.zoominfo.com/c/sun-international/138903646
201.218.210.108 yes 443 [] Microsoft IIS httpd TECNOLOGIA APLICADA, S.A (TECNASA) Microsoft-IIS/10.0 ptyvexch01 PA Panama Panama City Tecnasa U Calle Ruben Dario, Ancon, Panama, Panama $30 Million 159 www.tecnasa.com Software & Technical Consulting, Software Development & Design Software https://www.zoominfo.com/c/tecnasa-u/353657144 gabyaued@gmail.com
168.77.213.71 yes 443 "[""senadis.gob.pa""]" Microsoft IIS httpd "[""mail.senadis.gob.pa""]" Autoridad Nacional para la Innovación Gubernamental Microsoft-IIS/10.0 mail.senadis.gob.pa PA Panama Panama City "{""CVE-2021-34473"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" TopManage Ave Ricardo J. Alfaro, Panama, Panama, Panama $18 Million 95 www.topmanage.com Engineering Software, Software Development & Design, Software https://www.zoominfo.com/c/topmanage-sa/346482836 +507 300-7200
200.35.105.12 yes 443 "[""avior.com.ve""]" Microsoft IIS httpd "[""mail.avior.com.ve""]" TELEFONICA VENEZOLANA, C.A. Microsoft-IIS/8.5 *.avior.com.ve VE Venezuela, Bolivarian Republic of Barcelona "{""CVE-2021-34473"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473""],""cvss"":9.1,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-31206"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206""],""cvss"":7.6,""summary"":""Microsoft Exchange Server Remote Code Execution Vulnerability""},""CVE-2021-34523"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523""],""cvss"":9.0,""summary"":""Microsoft Exchange Server Elevation of Privilege Vulnerability""},""CVE-2021-31207"":{""verified"":true,""references"":[""https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207""],""cvss"":6.6,""summary"":""Microsoft Exchange Server Security Feature Bypass Vulnerability""}}" Avior Airlines "Aeropuerto Internacional ""José Antonio Anzoátegui"", Hangar #2, Barcelona, Anzoategui, V" $170 Million 825 www.avior.com.ve Airlines, Airports & Air Services Transportation https://www.zoominfo.com/c/avior-airlines/398914164 ramirez_luis_s@hotmail.com +58 501-2846700
=0iLu4iLt0SLt4SLt0iLu0SLt0SLu0SLt0iLu4iLu4iLu0SLt0SLu4iLu4iLt0SLu4iL no (contact: t.me/corposint)
t0SLu4SLt0iLu0SLt0SLu4iLu0SLu4iLu4iLt0SLu4iLt0iLu4SLt4iLu4SL no (contact: t.me/corposint)
=4iLu0SLt0SLt0iLu0SLt4SLt0SLu4iLu0iLu4SLt4iLu4iLt0SLt4SLt0SLu0SLt0iL no (contact: t.me/corposint)
=0SLt0iLu0SLt0SLt0iLu0SLu4iLu0SLt0iLt0SLt4iLt0SLt0SLt0SLt0iLu0SLt0iL no (contact: t.me/corposint)
=0SLu4iLu4SLt0iLu4iLt0SLt0iLu4iLu4iLu4iLt4iLt0SLt0iLu4SLt0SLu0SLt0iL no (contact: t.me/corposint)
=4iLu4iLt0SLu4iLu4iLu0SLt4iLt0SLu4SLt4iLu0SLu4iLt0SLt0iLt0SLt0SLt4iL no (contact: t.me/corposint)
t0SLu4iLu4SLt4iLu0SLt0SLt0iLu4iLu4iLu4SLu4iLu0SLt0SLu0iLu4iL no (contact: t.me/corposint)
t4iLu4iLu4iLt0SLt0iLt0iLu4SLt0iLu4SLt0SLt0SLt4SLt0SLu0SLt4iL no (contact: t.me/corposint)
=0iLu4iLt0SLu4iLu4iLt0SLt0SLt0iLu4SLt0iLu4iLu4SLt4iLu4iLu4SLt0SLt0iL no (contact: t.me/corposint)
=0SLu4iLt0iLu4SLu4iLu4SLt0SLt0iLu4iLu0SLt4iLu4SLt0SLt4iLu4iLt0SLt0iL no (contact: t.me/corposint)
=0iLu4iLt4iLu4iLt0SLt0iLu4iLu4iLu0SLt4iLu4iLt0SLt0iLu4SLt0SLu0SLt0iL no (contact: t.me/corposint)
=0iLu4iLt0SLt4SLt0iLu0iLu4iLt0iLu4SLt0SLu0SLt0SLu0SLt0SLt0SLt0SLt0iL no (contact: t.me/corposint)
=4iLu4SLt0SLt0SLt4iLu4iLu4SLt0SLt4iLu4iLt4iLu4iLt4iLu4SLt0iLu0SLt0iL no (contact: t.me/corposint)
=0iLu4iLt0SLt4SLt0iLu0SLt0SLu0SLt0iLu4iLu4iLu0SLt0SLu4iLu4iLt0SLu4iL no (contact: t.me/corposint)
=4iLu0SLt0iLu4iLu4SLt4iLt0SLt0SLu4SLt4iLu0SLu4iLt0SLt0iLt0SLt0SLt4iL no (contact: t.me/corposint)
u4iLt0iLu4iLu4iLu0SLt0SLt0iLu4iLu4iLu4SLu4iLu0SLt0SLu0iLu4iL no (contact: t.me/corposint)
В чем прикол?
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх