February 25, 2020 at 3:17:16 PM UTC
VERIFY
Websites
Websites
Runtime: 5.5s
Share on Facebook or Twitter
On February 25, 2020 at 3:17:16 PM UTC, http://www.securityfocus.com/ was accessible when tested on AS24691 in Togo.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
41.207.188.88
Query:
IN A www.securityfocus.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
CNAME
css-si20200214001955850400000001-1682740407.us-east-1.elb.amazonaws.com
Unknown AS
@
IN
A
34.236.212.156
Unknown AS
@
IN
A
52.73.91.254
Unknown AS

TCP Connections

52.73.91.254:80: succeeded
34.236.212.156:80: succeeded

HTTP Requests

URL
GET https://www.securityfocus.com/
Response Headers
Content-Length:
11645
Accept-Ranges:
bytes
Server:
Apache/2.2.3 (CentOS)
Last-Modified:
Tue, 25 Feb 2020 16:15:01 GMT
Connection:
keep-alive
ETag:
"9099a-2d7d-59f68ca2e4b40"
Date:
Tue, 25 Feb 2020 16:17:21 GMT
Content-Type:
text/html; charset=UTF-8
Response Body
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" 
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="description" content="SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet&apos;s largest and most comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list.">
<meta name="keywords" content="securityfocus, security focus, computer security, information security, security, hack, full disclosure, bugtraq, bugtrack, bugtrac, bugtrag, vulnerability, vulnerabilities, vulnerability database, auditing, spoofing, sniffer, sniffing, exploit, advisory, antivirus, virus, firewall, buffer overflow, overflow, password, windows, windows nt, solaris, linux, crack, cracker, cracking, IDS, intrusion detection, backdoor, backdoors, trojan, cryptography, encryption, authentication, DoS, DDoS, denial of service, syn flooding, smurf, internet security, web security, security tools, security products, vuln-dev, security incidents, incident responce, bugtraq-jp, bugtraq-es, security jobs, sf-news, focus-ms, focus-sun, focus-linux, focus-ids, focus-ih, infowar, information warfare, VPN, virtual private network">
<script language="JavaScript">
var pathname='/home';
var OAS_listpos = 'Top,Middle,Right1,x28';
</script>
<SCRIPT LANGUAGE="JavaScript1.2" SRC="/js/standard.js"></SCRIPT>
<script src="/__utm.js" type="text/javascript"></script>
<link rel="stylesheet" type="text/css" href="/new_SFPS_style.css" />
<title>SecurityFocus</title>

</head>

<body bgcolor="#ffffff">
<map name="ButtonMap">
  <area shape="rect" coords="139,25,190,45" href="/about">
  <area shape="rect" coords="191,25,249,45" href="/contact">
</map>
<!-- start header -->

<a href="/"><div id="logo_new">
		<div class="headerButtonBar"><img src="/images/site/header_button_bar.gif" width="258" height="45" alt="" usemap="#ButtonMap" border="0"></div>
</div></a>
<div id="bannerAd">
<table width="890" cellpadding="0" border="0" cellspacing="0">
<tr><td width="728">
<a href="http://www.symantec.com/connect/" target="_blank"><img src="/images/site/sf-symc-connect-banner.jpg" width="728" height="90" alt="" border="0"/></a>
</td>
<td width="12">&nbsp;</td>
<td width="150" align="right">
&nbsp;
<td>
</tr>
</table>

</div>

<!-- end header -->


<form name="mailinglists" action="/archive" method="POST">
<input type="hidden" name="c" value="maillists">
<input type="hidden" name="confirm" value="1">
<table width="900" cellpadding="0" cellspacing="4" border="0">
	<tr valign="top">
		<td>
			<!-- Start Content -->
			<div style="padding: 5px;">
<!-- Vulns -->
<div style="padding: 4px;">
<div class="breakline"></div>
<span class="txtMedBold">Vulnerabilities</span><br/>
<div class="breakline"></div>
<table>
<tr valign="top"><td>

	
	<b><a href="/bid/109320"><span class="headline">Jenkins Credentials Binding Plugin CVE-2019-1010241 Information Disclosure Vulnerability</span></a></b><br/>
	<span class="date">2019-07-26</span><br/>
	<a href="/bid/109320">http://www.securityfocus.com/bid/109320</a><br/><br/>
	

	
	<b><a href="/bid/109383"><span class="headline">Qualcomm Components CVE-2019-2307 Integer Underflow Vulnerability</span></a></b><br/>
	<span class="date">2019-07-26</span><br/>
	<a href="/bid/109383">http://www.securityfocus.com/bid/109383</a><br/><br/>
	

	
	<b><a href="/bid/109374"><span class="headline">LibreOffice Remote Code Execution and Unauthorized Access Vulnerabilities</span></a></b><br/>
	<span class="date">2019-07-26</span><br/>
	<a href="/bid/109374">http://www.securityfocus.com/bid/109374</a><br/><br/>
	

	
	<b><a href="/bid/98412"><span class="headline">KDE KAuth CVE-2017-8422 Local Privilege Escalation Vulnerability</span></a></b><br/>
	<span class="date">2019-07-25</span><br/>
	<a href="/bid/98412">http://www.securityfocus.com/bid/98412</a><br/><br/>
	

	
	<b><a href="/bid/109369"><span class="headline">FreeBSD CVE-2019-5604 Out of Bounds Read Denial of Service Vulnerability</span></a></b><br/>
	<span class="date">2019-07-25</span><br/>
	<a href="/bid/109369">http://www.securityfocus.com/bid/109369</a><br/><br/>
	

	

	

	

	

	

</td>
<td>

	

	

	

	

	

	
	<b><a href="/bid/109338"><span class="headline">Exim CVE-2019-13917 Privilege Escalation Vulnerability</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109338">http://www.securityfocus.com/bid/109338</a><br/><br/>
	

	
	<b><a href="/bid/109380"><span class="headline">Libdwarf CVE-2019-14249 Remote Denial Of Service Vulnerability</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109380">http://www.securityfocus.com/bid/109380</a><br/><br/>
	

	
	<b><a href="/bid/109377"><span class="headline">McAfee Data Loss Prevention Endpoint for Windows Multiple Local Security Vulnerabilities</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109377">http://www.securityfocus.com/bid/109377</a><br/><br/>
	

	
	<b><a href="/bid/109372"><span class="headline">Drupal SA-CONTRIB-2019-059 Access Bypass Vulnerability</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109372">http://www.securityfocus.com/bid/109372</a><br/><br/>
	

	
	<b><a href="/bid/109371"><span class="headline">Drupal Existing Values Autocomplete Widget Module Access Bypass Vulnerability</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109371">http://www.securityfocus.com/bid/109371</a><br/><br/>
	

</td></tr></table><br/>
<b><a href="/vulnerabilities">&#187; Search all vulnerabilities</a></b><br/><br/>
</div>
<div class="breakline"></div>
<!-- /Vulns -->
				<span class="txtMedBold">Bugtraq Mailing List</span><br/>
				Please check the box to subscribe to or unsubscribe from Bugtraq.
				<div class="breakline"></div>
				
					

					

					

				<table cellpadding="2" cellspacing="0" border="0">
						
					<tr>
						<td>Email address:</td>
						<td><input type="text" name="EmailAddress" size="30"></td>
					</tr>
					<tr>
						<td>Confirm address:</td>
						<td><input type="text" name="ConfirmEmailAddress" size="30"></td>
					</tr>
					<tr>
						<td>&nbsp;</td>
						<td>
							<input type="submit" name="op" value="Subscribe">&nbsp;
							<input type="submit" name="op" value="Unsubscribe">	
						</td>
					</tr>
					<tr>
						<td colspan="2"><span class="txtXXSmall">You will receive an email confirmation</span></td>
					</tr>
				</table>
				<div class="breakline"></div>




				<div id="articleTools" style="background-color:#036; color: #fff;">
					<span class="txtSmallBold" style="float: left; display: inline;">Bugtraq Mailing List</span>
				</div>
				<input type="hidden" name="popular_count" value="1">
				<table cellpadding="0" cellspacing="0" border="0">

					<tr valign="top">														<td><input type="checkbox" name="popular_1" value="1" id="popular_1"></td>
	<td width="100%">
		<div class="txtXSmallBold" style="margin-top: 2px; background-color: #eaeaea; border: solid 1px #ccc; padding: 1px;"><label for="popular_1">Bugtraq</label> &nbsp; <span class="txtXXSmall"><a href="/archive/1/description" onClick="openFAQ(this.href,'Bugtraq'); return false;">FAQ</a></span></div>
		<div id="vulnerabilities">
			<span class="txtXSmall">
			<ul>
				
				<li><a href="/archive/1/542246">Local information disclosure in OpenSMTPD (CVE-2020-8793)</a></li>
				
				<li><a href="/archive/1/542245">Defense in depth -- the Microsoft way (part 62): Windows shipped with end-of-life components</a></li>
				
				<li><a href="/archive/1/542244">LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)</a></li>
				
				<li><a href="/archive/1/542243">[SECURITY] [DSA 4633-1] curl security update</a></li>
				
				<li><a href="/archive/1/542242">Cisco Unified Contact Center Express Privilege Escalation Vulnerability (CVE-2019-1888)</a></li>
				
				<li><a href="/archive/1/542241">[TZO-22-2020] Qihoo360 | GDATA | Rising | Command Generic Malformed Archive Bypass</a></li>
				
				<li><a href="/archive/1/542240">[TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)</a></li>
				
				<li><a href="/archive/1/542239">[slackware-security]  proftpd (SSA:2020-051-01)</a></li>
				
				<li><a href="/archive/1/542238">[SECURITY] [DSA 4628-1] php7.0 security update</a></li>
				
				<li><a href="/archive/1/542237">[SECURITY] [DSA 4629-1] python-django security update</a></li>
				
				<li><b><a href="/archive/1">Complete Archive</a></li>
			</ul>
			</span>
		</div>
	</td>	
						
						<!-- #### CSSINTEL-3916 - Curt - July 10, 2018

						
						 	<td></td></tr>
						 
						-->
						</tr>
						
							
					

				</table>


<!-- #### CSSINTEL-3916 - Curt - July 10, 2018


				<div id="articleTools" style="background-color:#036; color: #fff;">
					<span class="txtSmallBold" style="float: left; display: inline;">Most Popular</span>
					<span style="float: right; display: inline;"><input type="checkbox" name="most_popular" id="most_popular" onClick="toggleMostPopular(document.mailinglists);"><label for="most_popular">Select All Popular</label></span>
				</div>
				<input type="hidden" name="popular_count" value="1">
				<table cellpadding="0" cellspacing="0" border="0">

					<tr valign="top">														<td><input type="checkbox" name="popular_1" value="1" id="popular_1"></td>
	<td width="100%">
		<div class="txtXSmallBold" style="margin-top: 2px; background-color: #eaeaea; border: solid 1px #ccc; padding: 1px;"><label for="popular_1">Bugtraq</label> &nbsp; <span class="txtXXSmall"><a href="/archive/1/description" onClick="openFAQ(this.href,'Bugtraq'); return false;">FAQ</a></span></div>
		<div id="vulnerabilities">
			<span class="txtXSmall">
			<ul>
				
				<li><a href="/archive/1/542246">Local information disclosure in OpenSMTPD (CVE-2020-8793)</a></li>
				
				<li><a href="/archive/1/542245">Defense in depth -- the Microsoft way (part 62): Windows shipped with end-of-life components</a></li>
				
				<li><a href="/archive/1/542244">LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)</a></li>
				
				<li><a href="/archive/1/542243">[SECURITY] [DSA 4633-1] curl security update</a></li>
				
				<li><a href="/archive/1/542242">Cisco Unified Contact Center Express Privilege Escalation Vulnerability (CVE-2019-1888)</a></li>
				
				<li><a href="/archive/1/542241">[TZO-22-2020] Qihoo360 | GDATA | Rising | Command Generic Malformed Archive Bypass</a></li>
				
				<li><a href="/archive/1/542240">[TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)</a></li>
				
				<li><a href="/archive/1/542239">[slackware-security]  proftpd (SSA:2020-051-01)</a></li>
				
				<li><a href="/archive/1/542238">[SECURITY] [DSA 4628-1] php7.0 security update</a></li>
				
				<li><a href="/archive/1/542237">[SECURITY] [DSA 4629-1] python-django security update</a></li>
				
				<li><b><a href="/archive/1">Complete Archive</a></li>
			</ul>
			</span>
		</div>
	</td>	
						
						
							<td></td></tr>
						

						
							
					

				</table>

			<!-- End Content -->
		</td>
	</tr>
</table>
</form>
<!-- start footer -->
<table width="900" cellpadding="0" cellspacing="4" border="0">
	<tr valign="top">
		<td width="120">
		&nbsp;
		</td>
		<td>

<br/>
<p align="center" style="color: #666; font-size: 8pt;"><a href="/privacy">Privacy Statement</a><br>Copyright 2010, SecurityFocus</p>

		</td>
		<td width="160">
		&nbsp;
		</td>
	</tr>
</table>
</body>
</html>

URL
GET http://www.securityfocus.com/
Response Headers
Content-Length:
300
Server:
Apache/2.2.3 (CentOS)
Connection:
keep-alive
Location:
https://www.securityfocus.com/
Date:
Tue, 25 Feb 2020 16:17:20 GMT
Content-Type:
text/html; charset=iso-8859-1
Response Body
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="https://www.securityfocus.com/">here</a>.</p>
<hr>
<address>Apache/2.2.3 (CentOS) Server at www.securityfocus.com Port 80</address>
</body></html>
Measurement UID
0120200225dd3d31a935f51ca601df4a26957350
Report ID
20200225T161607Z_AS24691_a3JLxSAB3I97d3nYfNJVMoz110OknVQ7lTubyTYbRVbvyVdPef
Platform
android
Software Name
ooniprobe-android (2.2.0)
Measurement Engine
libmeasurement_kit (0.10.6)

Raw Measurement Data

Loading…