cve-2016-5195-bug.qvgz.org
Open in
urlscan Pro
172.67.164.189
Public Scan
Submission: On December 24 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on November 4th 2024. Valid for: 3 months.
This is the only time cve-2016-5195-bug.qvgz.org was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 172.67.164.189 172.67.164.189 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:4f49 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 157.240.0.6 157.240.0.6 | 32934 (FACEBOOK) (FACEBOOK) | |
1 | 157.240.0.35 157.240.0.35 | 32934 (FACEBOOK) (FACEBOOK) | |
10 | 4 |
ASN32934 (FACEBOOK, US)
PTR: xx-fbcdn-shv-02-fra3.fbcdn.net
connect.facebook.net |
ASN32934 (FACEBOOK, US)
PTR: edge-star-mini-shv-02-fra3.facebook.com
www.facebook.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
qvgz.org
cve-2016-5195-bug.qvgz.org |
111 KB |
2 |
facebook.net
connect.facebook.net — Cisco Umbrella Rank: 192 |
77 KB |
1 |
facebook.com
www.facebook.com — Cisco Umbrella Rank: 120 |
|
1 |
cloudflareinsights.com
static.cloudflareinsights.com — Cisco Umbrella Rank: 617 |
7 KB |
10 | 4 |
Domain | Requested by | |
---|---|---|
6 | cve-2016-5195-bug.qvgz.org |
cve-2016-5195-bug.qvgz.org
static.cloudflareinsights.com |
2 | connect.facebook.net |
cve-2016-5195-bug.qvgz.org
connect.facebook.net |
1 | www.facebook.com |
connect.facebook.net
|
1 | static.cloudflareinsights.com |
cve-2016-5195-bug.qvgz.org
|
10 | 4 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
qvgz.org WE1 |
2024-11-04 - 2025-02-02 |
3 months | crt.sh |
cloudflareinsights.com WE1 |
2024-11-01 - 2025-01-30 |
3 months | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2024-10-02 - 2024-12-31 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://cve-2016-5195-bug.qvgz.org/
Frame ID: 8A4E63DCA585319B45C02EDA2171BA51
Requests: 9 HTTP requests in this frame
Frame:
https://www.facebook.com/v2.8/plugins/like.php?action=like&app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df0bb5d68b897ce10f%26domain%3Dcve-2016-5195-bug.qvgz.org%26is_canvas%3Dfalse%26origin%3Dhttps%253A%252F%252Fcve-2016-5195-bug.qvgz.org%252Ff79d7f8e45be91a4b%26relation%3Dparent.parent&container_width=700&href=https%3A%2F%2Fwww.facebook.com%2FDirty-COW-Vulnerability-1203812509677078%2F&layout=button&locale=en_US&sdk=joey&share=false&show_faces=false
Frame ID: 5EE7BC00FEAE87C356298BB190849A2B
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Dirty COW (CVE-2016-5195)Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Cloudflare Browser Insights (Analytics) Expand
Detected patterns
- static\.cloudflareinsights\.com/beacon(?:\.min)?\.js
Facebook (Widgets) Expand
Detected patterns
- //connect\.facebook\.([a-z]+)/[^/]*/[a-z]*\.js
Page Statistics
23 Outgoing links
These are links going to different origins than the main page.
Title: Twitter
Search URL Search Domain Scan URL
Title: Wiki
Search URL Search Domain Scan URL
Title: Shop
Search URL Search Domain Scan URL
Title: View Exploit
Search URL Search Domain Scan URL
Title: race condition
Search URL Search Domain Scan URL
Title: RH
Search URL Search Domain Scan URL
Title: in the wild exploit
Search URL Search Domain Scan URL
Title: Phil Oester
Search URL Search Domain Scan URL
Title: https://dirtycow.ninja
Search URL Search Domain Scan URL
Title: No
Search URL Search Domain Scan URL
Title: Red Hat
Search URL Search Domain Scan URL
Title: Debian
Search URL Search Domain Scan URL
Title: Ubuntu
Search URL Search Domain Scan URL
Title: SUSE
Search URL Search Domain Scan URL
Title: fix
Search URL Search Domain Scan URL
Title: these
Search URL Search Domain Scan URL
Title: exploited
Search URL Search Domain Scan URL
Title: Maybe
Search URL Search Domain Scan URL
Title: Phil Oester
Search URL Search Domain Scan URL
Title: twitter
Search URL Search Domain Scan URL
Title: Donate money to the FreeBSD project
Search URL Search Domain Scan URL
Title: a bright side
Search URL Search Domain Scan URL
Title: GitHub
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
cve-2016-5195-bug.qvgz.org/ |
11 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
cve-2016-5195-bug.qvgz.org/ |
146 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
rocket-loader.min.js
cve-2016-5195-bug.qvgz.org/cdn-cgi/scripts/7d0fa10a/cloudflare-static/ |
12 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vcd15cbe7772f49c399c6a5babf22c1241717689176015
static.cloudflareinsights.com/beacon.min.js/ |
19 KB 7 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cow.svg
cve-2016-5195-bug.qvgz.org/ |
439 KB 74 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
sdk.js
connect.facebook.net/en_US/ |
3 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
rum
cve-2016-5195-bug.qvgz.org/cdn-cgi/ |
0 149 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
cve-2016-5195-bug.qvgz.org/ |
9 KB 3 KB |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
sdk.js
connect.facebook.net/en_US/ |
254 KB 75 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
like.php
www.facebook.com/v2.8/plugins/ Frame 5EE7 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| __cfQR object| __cfBeacon boolean| __cfRLUnblockHandlers object| FB object| __buffer0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.facebook.net
cve-2016-5195-bug.qvgz.org
static.cloudflareinsights.com
www.facebook.com
157.240.0.35
157.240.0.6
172.67.164.189
2606:4700::6810:4f49
2e2020f6460dace62ae9297bfff2882d77510e3edcbcdac7fc623754d799ea3c
675e573386c30cd7cd0febec0c5451222968989263d6b9d7396ec68ce14cbecd
7e8de46475deed08b8901246c77d25a6969113bef9ba295cf5286d8993d5b6b9
8a18d13015336bc184819a5a768447462202ef3105ec511bf42ed8304a7ed94f
94b5432b73641973d71cf7d417dc3e51902fc064b5b46f400c416963a16345cd
a47ec664f3c108d798e46d1e7b84219d5640eed73c060fdda0e0747ba43a0deb
ccf00d1923b0131a10e0c6d26f95e5dee6ebf8621a27e83c5a2f68a2e0093142
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
fa1063f5a293a92f90b31d3c9405f0edf97743f4300800b8f1e0f6fc013acb60