OK
http://www.securityfocus.com/
Romania
Country
AS8708
Network
June 29, 2020, 03:53 AM UTC
Date & Time
Websites
Websites
Web Connectivity Test
Runtime: 3.2s

On June 29, 2020, 03:53 AM UTC, http://www.securityfocus.com/ was accessible when tested on AS8708 in Romania.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
(unknown)
Query:
IN A www.securityfocus.com
Engine:
Name
Class
TTL
Type
DATA
@
IN
TTL
CNAME
www.sf.symds.io
@
IN
TTL
CNAME
sf01web.securityfocus.symds.io
@
IN
TTL
CNAME
css-si20200214001955850400000001-1682740407.us-east-1.elb.amazonaws.com
@
IN
TTL
A
54.173.172.222
@
IN
TTL
A
52.44.92.113

TCP Connections

Connection to 52.44.92.113:80 succeeded.
Connection to 54.173.172.222:80 succeeded.
Connection to www.sf.symds.io:80 succeeded.
Connection to css-si20200214001955850400000001-1682740407.us-east-1.elb.amazonaws.com:80 succeeded.
Connection to sf01web.securityfocus.symds.io:80 succeeded.

HTTP Requests

URL
GET https://www.securityfocus.com/
Response Headers
content-encoding:
Accept-Ranges:
bytes
Server:
Apache/2.2.3 (CentOS)
Last-Modified:
Mon, 29 Jun 2020 04:15:01 GMT
ETag:
"9099a-2d7d-5a9314d6c7b40"
Date:
Mon, 29 Jun 2020 04:26:20 GMT
Content-Type:
text/html; charset=UTF-8
Response Body
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" 
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="description" content="SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet&apos;s largest and most comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list.">
<meta name="keywords" content="securityfocus, security focus, computer security, information security, security, hack, full disclosure, bugtraq, bugtrack, bugtrac, bugtrag, vulnerability, vulnerabilities, vulnerability database, auditing, spoofing, sniffer, sniffing, exploit, advisory, antivirus, virus, firewall, buffer overflow, overflow, password, windows, windows nt, solaris, linux, crack, cracker, cracking, IDS, intrusion detection, backdoor, backdoors, trojan, cryptography, encryption, authentication, DoS, DDoS, denial of service, syn flooding, smurf, internet security, web security, security tools, security products, vuln-dev, security incidents, incident responce, bugtraq-jp, bugtraq-es, security jobs, sf-news, focus-ms, focus-sun, focus-linux, focus-ids, focus-ih, infowar, information warfare, VPN, virtual private network">
<script language="JavaScript">
var pathname='/home';
var OAS_listpos = 'Top,Middle,Right1,x28';
</script>
<SCRIPT LANGUAGE="JavaScript1.2" SRC="/js/standard.js"></SCRIPT>
<script src="/__utm.js" type="text/javascript"></script>
<link rel="stylesheet" type="text/css" href="/new_SFPS_style.css" />
<title>SecurityFocus</title>

</head>

<body bgcolor="#ffffff">
<map name="ButtonMap">
  <area shape="rect" coords="139,25,190,45" href="/about">
  <area shape="rect" coords="191,25,249,45" href="/contact">
</map>
<!-- start header -->

<a href="/"><div id="logo_new">
		<div class="headerButtonBar"><img src="/images/site/header_button_bar.gif" width="258" height="45" alt="" usemap="#ButtonMap" border="0"></div>
</div></a>
<div id="bannerAd">
<table width="890" cellpadding="0" border="0" cellspacing="0">
<tr><td width="728">
<a href="http://www.symantec.com/connect/" target="_blank"><img src="/images/site/sf-symc-connect-banner.jpg" width="728" height="90" alt="" border="0"/></a>
</td>
<td width="12">&nbsp;</td>
<td width="150" align="right">
&nbsp;
<td>
</tr>
</table>

</div>

<!-- end header -->


<form name="mailinglists" action="/archive" method="POST">
<input type="hidden" name="c" value="maillists">
<input type="hidden" name="confirm" value="1">
<table width="900" cellpadding="0" cellspacing="4" border="0">
	<tr valign="top">
		<td>
			<!-- Start Content -->
			<div style="padding: 5px;">
<!-- Vulns -->
<div style="padding: 4px;">
<div class="breakline"></div>
<span class="txtMedBold">Vulnerabilities</span><br/>
<div class="breakline"></div>
<table>
<tr valign="top"><td>

	
	<b><a href="/bid/109320"><span class="headline">Jenkins Credentials Binding Plugin CVE-2019-1010241 Information Disclosure Vulnerability</span></a></b><br/>
	<span class="date">2019-07-26</span><br/>
	<a href="/bid/109320">http://www.securityfocus.com/bid/109320</a><br/><br/>
	

	
	<b><a href="/bid/109383"><span class="headline">Qualcomm Components CVE-2019-2307 Integer Underflow Vulnerability</span></a></b><br/>
	<span class="date">2019-07-26</span><br/>
	<a href="/bid/109383">http://www.securityfocus.com/bid/109383</a><br/><br/>
	

	
	<b><a href="/bid/109374"><span class="headline">LibreOffice Remote Code Execution and Unauthorized Access Vulnerabilities</span></a></b><br/>
	<span class="date">2019-07-26</span><br/>
	<a href="/bid/109374">http://www.securityfocus.com/bid/109374</a><br/><br/>
	

	
	<b><a href="/bid/98412"><span class="headline">KDE KAuth CVE-2017-8422 Local Privilege Escalation Vulnerability</span></a></b><br/>
	<span class="date">2019-07-25</span><br/>
	<a href="/bid/98412">http://www.securityfocus.com/bid/98412</a><br/><br/>
	

	
	<b><a href="/bid/109369"><span class="headline">FreeBSD CVE-2019-5604 Out of Bounds Read Denial of Service Vulnerability</span></a></b><br/>
	<span class="date">2019-07-25</span><br/>
	<a href="/bid/109369">http://www.securityfocus.com/bid/109369</a><br/><br/>
	

	

	

	

	

	

</td>
<td>

	

	

	

	

	

	
	<b><a href="/bid/109338"><span class="headline">Exim CVE-2019-13917 Privilege Escalation Vulnerability</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109338">http://www.securityfocus.com/bid/109338</a><br/><br/>
	

	
	<b><a href="/bid/109380"><span class="headline">Libdwarf CVE-2019-14249 Remote Denial Of Service Vulnerability</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109380">http://www.securityfocus.com/bid/109380</a><br/><br/>
	

	
	<b><a href="/bid/109377"><span class="headline">McAfee Data Loss Prevention Endpoint for Windows Multiple Local Security Vulnerabilities</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109377">http://www.securityfocus.com/bid/109377</a><br/><br/>
	

	
	<b><a href="/bid/109372"><span class="headline">Drupal SA-CONTRIB-2019-059 Access Bypass Vulnerability</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109372">http://www.securityfocus.com/bid/109372</a><br/><br/>
	

	
	<b><a href="/bid/109371"><span class="headline">Drupal Existing Values Autocomplete Widget Module Access Bypass Vulnerability</span></a></b><br/>
	<span class="date">2019-07-24</span><br/>
	<a href="/bid/109371">http://www.securityfocus.com/bid/109371</a><br/><br/>
	

</td></tr></table><br/>
<b><a href="/vulnerabilities">&#187; Search all vulnerabilities</a></b><br/><br/>
</div>
<div class="breakline"></div>
<!-- /Vulns -->
				<span class="txtMedBold">Bugtraq Mailing List</span><br/>
				Please check the box to subscribe to or unsubscribe from Bugtraq.
				<div class="breakline"></div>
				
					

					

					

				<table cellpadding="2" cellspacing="0" border="0">
						
					<tr>
						<td>Email address:</td>
						<td><input type="text" name="EmailAddress" size="30"></td>
					</tr>
					<tr>
						<td>Confirm address:</td>
						<td><input type="text" name="ConfirmEmailAddress" size="30"></td>
					</tr>
					<tr>
						<td>&nbsp;</td>
						<td>
							<input type="submit" name="op" value="Subscribe">&nbsp;
							<input type="submit" name="op" value="Unsubscribe">	
						</td>
					</tr>
					<tr>
						<td colspan="2"><span class="txtXXSmall">You will receive an email confirmation</span></td>
					</tr>
				</table>
				<div class="breakline"></div>




				<div id="articleTools" style="background-color:#036; color: #fff;">
					<span class="txtSmallBold" style="float: left; display: inline;">Bugtraq Mailing List</span>
				</div>
				<input type="hidden" name="popular_count" value="1">
				<table cellpadding="0" cellspacing="0" border="0">

					<tr valign="top">														<td><input type="checkbox" name="popular_1" value="1" id="popular_1"></td>
	<td width="100%">
		<div class="txtXSmallBold" style="margin-top: 2px; background-color: #eaeaea; border: solid 1px #ccc; padding: 1px;"><label for="popular_1">Bugtraq</label> &nbsp; <span class="txtXXSmall"><a href="/archive/1/description" onClick="openFAQ(this.href,'Bugtraq'); return false;">FAQ</a></span></div>
		<div id="vulnerabilities">
			<span class="txtXSmall">
			<ul>
				
				<li><a href="/archive/1/542246">Local information disclosure in OpenSMTPD (CVE-2020-8793)</a></li>
				
				<li><a href="/archive/1/542245">Defense in depth -- the Microsoft way (part 62): Windows shipped with end-of-life components</a></li>
				
				<li><a href="/archive/1/542244">LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)</a></li>
				
				<li><a href="/archive/1/542243">[SECURITY] [DSA 4633-1] curl security update</a></li>
				
				<li><a href="/archive/1/542242">Cisco Unified Contact Center Express Privilege Escalation Vulnerability (CVE-2019-1888)</a></li>
				
				<li><a href="/archive/1/542241">[TZO-22-2020] Qihoo360 | GDATA | Rising | Command Generic Malformed Archive Bypass</a></li>
				
				<li><a href="/archive/1/542240">[TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)</a></li>
				
				<li><a href="/archive/1/542239">[slackware-security]  proftpd (SSA:2020-051-01)</a></li>
				
				<li><a href="/archive/1/542238">[SECURITY] [DSA 4628-1] php7.0 security update</a></li>
				
				<li><a href="/archive/1/542237">[SECURITY] [DSA 4629-1] python-django security update</a></li>
				
				<li><b><a href="/archive/1">Complete Archive</a></li>
			</ul>
			</span>
		</div>
	</td>	
						
						<!-- #### CSSINTEL-3916 - Curt - July 10, 2018

						
						 	<td></td></tr>
						 
						-->
						</tr>
						
							
					

				</table>


<!-- #### CSSINTEL-3916 - Curt - July 10, 2018


				<div id="articleTools" style="background-color:#036; color: #fff;">
					<span class="txtSmallBold" style="float: left; display: inline;">Most Popular</span>
					<span style="float: right; display: inline;"><input type="checkbox" name="most_popular" id="most_popular" onClick="toggleMostPopular(document.mailinglists);"><label for="most_popular">Select All Popular</label></span>
				</div>
				<input type="hidden" name="popular_count" value="1">
				<table cellpadding="0" cellspacing="0" border="0">

					<tr valign="top">														<td><input type="checkbox" name="popular_1" value="1" id="popular_1"></td>
	<td width="100%">
		<div class="txtXSmallBold" style="margin-top: 2px; background-color: #eaeaea; border: solid 1px #ccc; padding: 1px;"><label for="popular_1">Bugtraq</label> &nbsp; <span class="txtXXSmall"><a href="/archive/1/description" onClick="openFAQ(this.href,'Bugtraq'); return false;">FAQ</a></span></div>
		<div id="vulnerabilities">
			<span class="txtXSmall">
			<ul>
				
				<li><a href="/archive/1/542246">Local information disclosure in OpenSMTPD (CVE-2020-8793)</a></li>
				
				<li><a href="/archive/1/542245">Defense in depth -- the Microsoft way (part 62): Windows shipped with end-of-life components</a></li>
				
				<li><a href="/archive/1/542244">LPE and RCE in OpenSMTPD's default install (CVE-2020-8794)</a></li>
				
				<li><a href="/archive/1/542243">[SECURITY] [DSA 4633-1] curl security update</a></li>
				
				<li><a href="/archive/1/542242">Cisco Unified Contact Center Express Privilege Escalation Vulnerability (CVE-2019-1888)</a></li>
				
				<li><a href="/archive/1/542241">[TZO-22-2020] Qihoo360 | GDATA | Rising | Command Generic Malformed Archive Bypass</a></li>
				
				<li><a href="/archive/1/542240">[TZO-16-2020] - F-SECURE Generic Malformed Container bypass (GZIP)</a></li>
				
				<li><a href="/archive/1/542239">[slackware-security]  proftpd (SSA:2020-051-01)</a></li>
				
				<li><a href="/archive/1/542238">[SECURITY] [DSA 4628-1] php7.0 security update</a></li>
				
				<li><a href="/archive/1/542237">[SECURITY] [DSA 4629-1] python-django security update</a></li>
				
				<li><b><a href="/archive/1">Complete Archive</a></li>
			</ul>
			</span>
		</div>
	</td>	
						
						
							<td></td></tr>
						

						
							
					

				</table>

			<!-- End Content -->
		</td>
	</tr>
</table>
</form>
<!-- start footer -->
<table width="900" cellpadding="0" cellspacing="4" border="0">
	<tr valign="top">
		<td width="120">
		&nbsp;
		</td>
		<td>

<br/>
<p align="center" style="color: #666; font-size: 8pt;"><a href="/privacy">Privacy Statement</a><br>Copyright 2010, SecurityFocus</p>

		</td>
		<td width="160">
		&nbsp;
		</td>
	</tr>
</table>
</body>
</html>

URL
GET http://www.securityfocus.com/
Response Headers
Date:
Mon, 29 Jun 2020 04:26:20 GMT
Content-Type:
text/html; charset=iso-8859-1
Location:
https://www.securityfocus.com/
Server:
Apache/2.2.3 (CentOS)
Response Body

Empty body

Report ID

20200629T035331Z_AS8708_JXjrAFPqgUYzzHbquwFTFaYJGYRADKXi6IOOb78Zg9pxrA4l0y

Platform

linux

OONI Probe version

2.1.0

Measurement Kit version

none

Raw Measurement Data